General
-
Target
MKMA.exe
-
Size
132.8MB
-
Sample
241002-dsqa1avapn
-
MD5
26210a8c2404f926deeaff3a0b078650
-
SHA1
036222021f2905127521b863d3b45a57d377996c
-
SHA256
11268095435c4f1de4e84c48b39db70f6f405c5d9619b8f4708d2accdb6c878a
-
SHA512
6a6c590bb314ecb8c52fc466020226ff472ead6ac1564d0dd71ec20568a22acc95709fb92bbd4d8d9233f295ca2e2c9e3d0d2822a441fa3b2d595353437d8205
-
SSDEEP
3145728:b6mC1E0qtOU9SC++6y9MgYR5tyJb2PlRy3gWINvmbcad:boHqtOnC4y9Mx5u27PNkca
Behavioral task
behavioral1
Sample
MKMA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MKMA.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
MKMA.exe
-
Size
132.8MB
-
MD5
26210a8c2404f926deeaff3a0b078650
-
SHA1
036222021f2905127521b863d3b45a57d377996c
-
SHA256
11268095435c4f1de4e84c48b39db70f6f405c5d9619b8f4708d2accdb6c878a
-
SHA512
6a6c590bb314ecb8c52fc466020226ff472ead6ac1564d0dd71ec20568a22acc95709fb92bbd4d8d9233f295ca2e2c9e3d0d2822a441fa3b2d595353437d8205
-
SSDEEP
3145728:b6mC1E0qtOU9SC++6y9MgYR5tyJb2PlRy3gWINvmbcad:boHqtOnC4y9Mx5u27PNkca
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-