General
-
Target
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de
-
Size
157KB
-
Sample
240811-egmw6sxhnd
-
MD5
9a28f6f6015843090d00da12119f8a15
-
SHA1
c8bc6236a8ef0f312c642a55537de2bd3c7a7520
-
SHA256
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de
-
SHA512
c88224341f658d45be3ea785053e2616eeaf0829cc78615f7530f6a046c0315009b7140a5d386c11daec97826ce371e9688c119adbc4e819eb442f0844e6dae9
-
SSDEEP
1536:MRiAXaKD5gixq7OstjzjW6ZdjtETzR77i11GAbRp0BGiEA0O0o:6iAXaKD7Ia6KTdNAbzSGiN0OJ
Static task
static1
Behavioral task
behavioral1
Sample
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de
-
Size
157KB
-
MD5
9a28f6f6015843090d00da12119f8a15
-
SHA1
c8bc6236a8ef0f312c642a55537de2bd3c7a7520
-
SHA256
ecb6fdbbfaced6ed135945025128ee77b3a91e0410253c8bf4a2fe279d38a1de
-
SHA512
c88224341f658d45be3ea785053e2616eeaf0829cc78615f7530f6a046c0315009b7140a5d386c11daec97826ce371e9688c119adbc4e819eb442f0844e6dae9
-
SSDEEP
1536:MRiAXaKD5gixq7OstjzjW6ZdjtETzR77i11GAbRp0BGiEA0O0o:6iAXaKD7Ia6KTdNAbzSGiN0OJ
Score8/10-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1