Malware Analysis Report

2024-09-23 12:04

Sample ID 240612-m6gqfsscmg
Target 2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia
SHA256 a6c1ade005152d1f2478c9a15a6b8ccf6f6808b73f28a142f7e82ddb16e23c5d
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

a6c1ade005152d1f2478c9a15a6b8ccf6f6808b73f28a142f7e82ddb16e23c5d

Threat Level: Shows suspicious behavior

The file 2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Writes to the Master Boot Record (MBR)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-12 11:04

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 11:04

Reported

2024-06-12 11:07

Platform

win7-20240611-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe"

Signatures

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe"

Network

N/A

Files

C:\Users\Public\Documents\Baidu\Common\I18N\conf.db

MD5 06032e87dd9e61078a1fea718516c64b
SHA1 68c2b601b1a79a07ce19f649ad2066280e1af41a
SHA256 825f134908c85c321741cd9cd0ded7804c46ff6cc0ef31b4501521c444bf3d10
SHA512 8a4b6967f4bb144bdb0948705d8c972a00e499812c35eae71c2b8442ecc6bff8b9a51afc30639f2bcbb8d3209939ffa843105e07e886c62573602ee22b93eda8

memory/1940-8-0x00000000023B0000-0x00000000023B1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 11:04

Reported

2024-06-12 11:07

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe"

Signatures

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-12_28fb287f2832ab9b8c69a0f768c33803_mafia.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.113:443 www.bing.com tcp
US 8.8.8.8:53 6.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 113.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

C:\Users\Public\Documents\Baidu\Common\I18N\conf.db

MD5 2f4c715bbf417b3173dc422875f48444
SHA1 955ee6c48c3832a330307644208a87598ea20448
SHA256 6217945d730c222e7e8661acf7bd99ff4e16e8e70de3d522c483b93adc387a6e
SHA512 992a551b63f706b1fcce3ca3d0ba59dab1b95c50bff7ea9daa75a2195bd5841a2829cfdc352a1a01e81c232d5ae6d25f9bded32570b2ca34df4c5fd14dd36bc1

memory/2624-9-0x0000000001260000-0x0000000001261000-memory.dmp