General
-
Target
ë.zip
-
Size
804KB
-
Sample
240908-k5yapsxdnk
-
MD5
c9fc135a2a846ea53124360ea6065526
-
SHA1
a350c7013034654b4b881057cb610303d4b31adc
-
SHA256
22251a83671dcf0533c25f75c576607dcc98d780c318d68ff390f14c32da7e97
-
SHA512
a92ca970054fad4b6f8e5f8cf0324614535f4a102b1d70a9d1fb9f09966d7417cf3400a503c3ade89fcace02c085d49f9bcef7ef5a0bc9d90a7f7fbbb2c11176
-
SSDEEP
24576:YRl1A6eGXvLnZfkWoLW32/SP4pK/2Moq9NhfVYp:6l1BdtoLW32/SP4A/HXhU
Malware Config
Targets
-
-
Target
ë.zip
-
Size
804KB
-
MD5
c9fc135a2a846ea53124360ea6065526
-
SHA1
a350c7013034654b4b881057cb610303d4b31adc
-
SHA256
22251a83671dcf0533c25f75c576607dcc98d780c318d68ff390f14c32da7e97
-
SHA512
a92ca970054fad4b6f8e5f8cf0324614535f4a102b1d70a9d1fb9f09966d7417cf3400a503c3ade89fcace02c085d49f9bcef7ef5a0bc9d90a7f7fbbb2c11176
-
SSDEEP
24576:YRl1A6eGXvLnZfkWoLW32/SP4pK/2Moq9NhfVYp:6l1BdtoLW32/SP4A/HXhU
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1