General

  • Target

    Install.exe

  • Size

    163KB

  • Sample

    240527-2a6r2acc3s

  • MD5

    b51552b77057c2405f73bbbf9c89234a

  • SHA1

    4793adbba023f90d2d2ad0ec55199c56de815224

  • SHA256

    720e6962d75e37e8b47b160c5b3f60433a341f00abf60041630116b26858fbb0

  • SHA512

    564f4104e6e398eeef8acc7ce7cab694b6eebbe4233b7cb359829242b949dc7c5bf124a550a4d0402eb7da19b8bec6c1f6753563b17a8ae36fb639be595b8d66

  • SSDEEP

    3072:WQps+njY8n6Tz2RWATqduvp00QFSdEiTiB/SjqXOdbbZCOuWNyGLN:WQps+njYhSCeiSd/EJXOZb+WTLN

Score
10/10

Malware Config

Targets

    • Target

      Install.exe

    • Size

      163KB

    • MD5

      b51552b77057c2405f73bbbf9c89234a

    • SHA1

      4793adbba023f90d2d2ad0ec55199c56de815224

    • SHA256

      720e6962d75e37e8b47b160c5b3f60433a341f00abf60041630116b26858fbb0

    • SHA512

      564f4104e6e398eeef8acc7ce7cab694b6eebbe4233b7cb359829242b949dc7c5bf124a550a4d0402eb7da19b8bec6c1f6753563b17a8ae36fb639be595b8d66

    • SSDEEP

      3072:WQps+njY8n6Tz2RWATqduvp00QFSdEiTiB/SjqXOdbbZCOuWNyGLN:WQps+njYhSCeiSd/EJXOZb+WTLN

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks