General
-
Target
sample
-
Size
494KB
-
Sample
240701-gs7rts1ekm
-
MD5
90570683931d5f8a2ad2eac54d7ec9b4
-
SHA1
2e04b4ffa1ffafac3b5424bf6c59d0eefee13858
-
SHA256
9b7222bb21f452ddcb74beab90b78e805578d65c4e43758853f833ac1edb5ce1
-
SHA512
08cb12405bee74256212037938c3a367add8d6067c326fc154d2b6d9128254f817fff9e61672d67d4d6f4f37b78df6209b94f71c69f53abbf9db59bf0e36ec2c
-
SSDEEP
6144:lZHU5+U52U5ZU58U5ZU5BU59U5qU58U5Rb2:l5UAUsUbUGU3UnU3UIUCU3b2
Static task
static1
Malware Config
Targets
-
-
Target
sample
-
Size
494KB
-
MD5
90570683931d5f8a2ad2eac54d7ec9b4
-
SHA1
2e04b4ffa1ffafac3b5424bf6c59d0eefee13858
-
SHA256
9b7222bb21f452ddcb74beab90b78e805578d65c4e43758853f833ac1edb5ce1
-
SHA512
08cb12405bee74256212037938c3a367add8d6067c326fc154d2b6d9128254f817fff9e61672d67d4d6f4f37b78df6209b94f71c69f53abbf9db59bf0e36ec2c
-
SSDEEP
6144:lZHU5+U52U5ZU58U5ZU5BU59U5qU58U5Rb2:l5UAUsUbUGU3UnU3UIUCU3b2
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies boot configuration data using bcdedit
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-