General
-
Target
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033
-
Size
219KB
-
Sample
240611-r82wma1fmr
-
MD5
ecce8845921a91854ab34bff2623151e
-
SHA1
736a4cfad1ed83a6a0b75b0474d5e01a3a36f950
-
SHA256
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033
-
SHA512
36fda34df70629d054a55823a3cc83f9599446b36576fbc86a6aac6564460789e8b141eeb168d3e4578f28182da874dd840e57b642af1a1a315dfe08a17b53e0
-
SSDEEP
6144:pjU6yx1p7lvER8SPD/xzL0ruSSbAOfyV:Ju1pZvPuDF0ruSSbkV
Behavioral task
behavioral1
Sample
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033.dll
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033
-
Size
219KB
-
MD5
ecce8845921a91854ab34bff2623151e
-
SHA1
736a4cfad1ed83a6a0b75b0474d5e01a3a36f950
-
SHA256
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033
-
SHA512
36fda34df70629d054a55823a3cc83f9599446b36576fbc86a6aac6564460789e8b141eeb168d3e4578f28182da874dd840e57b642af1a1a315dfe08a17b53e0
-
SSDEEP
6144:pjU6yx1p7lvER8SPD/xzL0ruSSbAOfyV:Ju1pZvPuDF0ruSSbkV
Score10/10-
IsaacWiper
IsaacWiper is a partition-corrupting malware used in cyberattacks against Ukrainian organizations.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1