General
-
Target
2024-08-28_17.39.20.png
-
Size
3.7MB
-
Sample
240829-p9mf8asfra
-
MD5
31f64d08f06a9cdac51d0971f94a379e
-
SHA1
7befbfa708409b53f648ef7fdb742d791331c0b1
-
SHA256
4a29032f14ba4f5a8c0fe75ef1e067399065bb6f54897250624342216995a9a0
-
SHA512
e1890c301f066495bfc1530951da472526daf44003e5c002002b419340d82a4b37cf2b6f94e3db0d88405ed14deed853792dd34c5eeafc48fcdf6fc4ad301482
-
SSDEEP
98304:jltSQLuiVsyNaOKlyU2G7PpZK8X6Owfopr6At:jvSQLui/DKltLpZK8X69opuAt
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-28_17.39.20.png
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-28_17.39.20.png
-
Size
3.7MB
-
MD5
31f64d08f06a9cdac51d0971f94a379e
-
SHA1
7befbfa708409b53f648ef7fdb742d791331c0b1
-
SHA256
4a29032f14ba4f5a8c0fe75ef1e067399065bb6f54897250624342216995a9a0
-
SHA512
e1890c301f066495bfc1530951da472526daf44003e5c002002b419340d82a4b37cf2b6f94e3db0d88405ed14deed853792dd34c5eeafc48fcdf6fc4ad301482
-
SSDEEP
98304:jltSQLuiVsyNaOKlyU2G7PpZK8X6Owfopr6At:jvSQLui/DKltLpZK8X69opuAt
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-