General
-
Target
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba
-
Size
94KB
-
Sample
240912-2ptq1szemf
-
MD5
00eef18516836dbec9d81e1c3c219469
-
SHA1
f960643d15413b748fb9eab81a570770ed153a8f
-
SHA256
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba
-
SHA512
56682ca5a0acda105bb3e78385f9db5b236448d24a3d6422f50397084bef69bdd7a8330a1273beb52b2d3927edbad21dcb2cb5c9e66b65bde3f10e64460fd715
-
SSDEEP
1536:2SSABNx6vb4RoI4mwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK4:tSABNx6vb4RoI4mwRxO0tA6vGsa6cPIL
Static task
static1
Behavioral task
behavioral1
Sample
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba
-
Size
94KB
-
MD5
00eef18516836dbec9d81e1c3c219469
-
SHA1
f960643d15413b748fb9eab81a570770ed153a8f
-
SHA256
57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba
-
SHA512
56682ca5a0acda105bb3e78385f9db5b236448d24a3d6422f50397084bef69bdd7a8330a1273beb52b2d3927edbad21dcb2cb5c9e66b65bde3f10e64460fd715
-
SSDEEP
1536:2SSABNx6vb4RoI4mwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK4:tSABNx6vb4RoI4mwRxO0tA6vGsa6cPIL
Score8/10-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1