General

  • Target

    sample

  • Size

    77KB

  • Sample

    240907-cmzf2szejr

  • MD5

    ac7bb14b622c2d35219240671815bfd2

  • SHA1

    dbcb098e25db3587c2d2b72e8a1dfdd9274e7fb2

  • SHA256

    5f54d87c3a9f0ccf47783aa02c3e51d55edad950c717e0f59f1f307a45346251

  • SHA512

    5ffa0a7c6ba57106d49768cd0232e6dd73e2ad630d03c3ef75f981a921bbe7d4c28d671d260c3c5614f6cabd9379f79398b9bad3b3a5cbe2f1f2015697e73bf1

  • SSDEEP

    1536:O6QJFLCCwNieXvQehNFZuSuWtWWxTZdkG+NpcaEej3qcS/6aXWKjpsvH6ZJsnfJC:pQJFLhwTRZdkG+NpcaEej3qcS/6aXWKJ

Malware Config

Targets

    • Target

      sample

    • Size

      77KB

    • MD5

      ac7bb14b622c2d35219240671815bfd2

    • SHA1

      dbcb098e25db3587c2d2b72e8a1dfdd9274e7fb2

    • SHA256

      5f54d87c3a9f0ccf47783aa02c3e51d55edad950c717e0f59f1f307a45346251

    • SHA512

      5ffa0a7c6ba57106d49768cd0232e6dd73e2ad630d03c3ef75f981a921bbe7d4c28d671d260c3c5614f6cabd9379f79398b9bad3b3a5cbe2f1f2015697e73bf1

    • SSDEEP

      1536:O6QJFLCCwNieXvQehNFZuSuWtWWxTZdkG+NpcaEej3qcS/6aXWKjpsvH6ZJsnfJC:pQJFLhwTRZdkG+NpcaEej3qcS/6aXWKJ

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Probable phishing domain

MITRE ATT&CK Enterprise v15

Tasks