General

  • Target

    Monoxid.zip

  • Size

    107KB

  • Sample

    240526-r4zwgahh91

  • MD5

    72dcf43879533d1dad48f3136ffa6294

  • SHA1

    f2270825c06a3784951e0c48cf32861afe39e5c8

  • SHA256

    552941693c73400e44199352fef514eab6edc56a80894f0b60def3af713212bf

  • SHA512

    aeefbbd44c0c36a1ac05903a9d482801026a512b4401aed11f4eb14a541260b16f92ce824422ed3ad9de78294ce03c08c12fa9b2abe409c06fd232828d0a551f

  • SSDEEP

    3072:4Seqcyhngc6yReq6IYY2aTxUFdSpfY6DXxh:LBT0+1eFdS5Y61h

Malware Config

Targets

    • Target

      Monoxid.exe

    • Size

      305KB

    • MD5

      616861cfda9ddef5b3fff0090aaa45d8

    • SHA1

      bc7faeb0be99fc397dd6d896fd0f9d58aa9e27c6

    • SHA256

      de918f62f0d6acacfeea67992deae5787d5d23ffe0bbdf7f8486ff8fffc5742e

    • SHA512

      98daaec5c18eded91191b4f78a6749d95448db7ac35226b9e8385352302e821ee8492eac2a7b2bcd1cff89afd0d85770bfb2360e0943f50db3d765cbab9c7a22

    • SSDEEP

      6144:fqKyPmBLp8BMLm7+r9oN/lOi9E3AAqgm/:fqKWsAMLg/lOi9E3AAqz/

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

JavaScript

1
T1059.007

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks