General
-
Target
9930a750181aa91cb7a336e9bca621023517f03c81307eb24423847dc2349a4aN
-
Size
122KB
-
Sample
240928-ttvj4svdqp
-
MD5
5a9c62c5181a9fb41806e5572fd04470
-
SHA1
edec004949a59f639d4aa7db8ebb0e0ad05c4270
-
SHA256
9930a750181aa91cb7a336e9bca621023517f03c81307eb24423847dc2349a4a
-
SHA512
eca35762d4d45aa9a6fb189f113c6b6e8f4344032b3310e85ee1cf363bdae10c724ff4462c38631edf0b411c6448dacd59452e1423c74a3ab5f47a1ceb935451
-
SSDEEP
1536:aJUGCqveEeXdTeG4wu6oQuwEhQQWKXJR721rSTdk/cpAKdlaKrorkgA55iIJ:aHFveEyTAK7VKXXS1GT7AKzaKrtP55iW
Static task
static1
Behavioral task
behavioral1
Sample
9930a750181aa91cb7a336e9bca621023517f03c81307eb24423847dc2349a4aN.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
9930a750181aa91cb7a336e9bca621023517f03c81307eb24423847dc2349a4aN
-
Size
122KB
-
MD5
5a9c62c5181a9fb41806e5572fd04470
-
SHA1
edec004949a59f639d4aa7db8ebb0e0ad05c4270
-
SHA256
9930a750181aa91cb7a336e9bca621023517f03c81307eb24423847dc2349a4a
-
SHA512
eca35762d4d45aa9a6fb189f113c6b6e8f4344032b3310e85ee1cf363bdae10c724ff4462c38631edf0b411c6448dacd59452e1423c74a3ab5f47a1ceb935451
-
SSDEEP
1536:aJUGCqveEeXdTeG4wu6oQuwEhQQWKXJR721rSTdk/cpAKdlaKrorkgA55iIJ:aHFveEyTAK7VKXXS1GT7AKzaKrtP55iW
-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1