Resubmissions
28-08-2024 20:01
240828-yrjr2svfkm 428-08-2024 19:59
240828-yqdveatanc 728-08-2024 19:56
240828-ynna3ashqb 1028-08-2024 19:53
240828-yl1hlssgrf 1028-08-2024 19:52
240828-ylk3xsvcpp 328-08-2024 19:40
240828-ydgqjasdpf 828-08-2024 19:26
240828-x5ympasard 1028-08-2024 19:26
240828-x5tczasaqh 328-08-2024 19:21
240828-x24drs1hqd 828-08-2024 19:20
240828-x2hr3atcpj 3General
-
Target
Screenshot 2024-08-28 at 14.57.55.png
-
Size
419KB
-
Sample
240828-ydgqjasdpf
-
MD5
00345903f4db4bb2c44099a766cbadb0
-
SHA1
9fba40eb3a9ffb65b24c98e47d36d99b56fe588c
-
SHA256
49998dd0366a3d7dff3ec1b6c2add1c0f7283b42198273980025a41942bd8178
-
SHA512
efb23c5a838b2407d9b5544dd864734dbb8c892c445cca6f3e41ad8a77ce73e9f85fc6be960981de840aed20b4190f322742d40dbc4ddaa1de8e2b4d6876984f
-
SSDEEP
12288:m0EHCJmoNmRxMquJhItGXNBd/GyUtlsUVhVg:mviJ3OM3nH4yUt19g
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-08-28 at 14.57.55.png
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
Screenshot 2024-08-28 at 14.57.55.png
-
Size
419KB
-
MD5
00345903f4db4bb2c44099a766cbadb0
-
SHA1
9fba40eb3a9ffb65b24c98e47d36d99b56fe588c
-
SHA256
49998dd0366a3d7dff3ec1b6c2add1c0f7283b42198273980025a41942bd8178
-
SHA512
efb23c5a838b2407d9b5544dd864734dbb8c892c445cca6f3e41ad8a77ce73e9f85fc6be960981de840aed20b4190f322742d40dbc4ddaa1de8e2b4d6876984f
-
SSDEEP
12288:m0EHCJmoNmRxMquJhItGXNBd/GyUtlsUVhVg:mviJ3OM3nH4yUt19g
-
Adds policy Run key to start application
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1