General
-
Target
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10
-
Size
87KB
-
Sample
240609-h8rafsgc57
-
MD5
0d72c28f554c05b37c96da12d5292740
-
SHA1
fc3d1ef46fb05fc5ef7c2ffe5f30c32a090c08b6
-
SHA256
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10
-
SHA512
7a649afa4259b50f616b5c317511ad35820bfa437e7e6a36a4cf1abc91d86011287c5498a02cbb04afe66d3a077514585f87a30e3b1ae05aa599fb36fd788dd8
-
SSDEEP
1536:1MIPgEm56wnbkKC2ZyBJU066lwLCRVEB+nR/y8cmNrEIviCOzuajkrDl9HNSjw:11PgEOng1d66jRVa+n4NmNNouukrD7Hn
Static task
static1
Behavioral task
behavioral1
Sample
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10
-
Size
87KB
-
MD5
0d72c28f554c05b37c96da12d5292740
-
SHA1
fc3d1ef46fb05fc5ef7c2ffe5f30c32a090c08b6
-
SHA256
b65088955b89e7b591e880a357e8d3c0ee5e02458f59f9a920ec9096691eda10
-
SHA512
7a649afa4259b50f616b5c317511ad35820bfa437e7e6a36a4cf1abc91d86011287c5498a02cbb04afe66d3a077514585f87a30e3b1ae05aa599fb36fd788dd8
-
SSDEEP
1536:1MIPgEm56wnbkKC2ZyBJU066lwLCRVEB+nR/y8cmNrEIviCOzuajkrDl9HNSjw:11PgEOng1d66jRVa+n4NmNNouukrD7Hn
Score9/10-
Detects executables containing base64 encoded User Agent
-
UPX dump on OEP (original entry point)
-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1