General

  • Target

    61c8d219d29296ed0d06afdcb43f450485886cf7b24879ddec72b04d977859b6N

  • Size

    708KB

  • Sample

    241005-nw5vzasdmr

  • MD5

    08e9e6a30e19dabdb1d0e7a4ec72d2f0

  • SHA1

    41fa3bc692426853e0264456016059dd9bb60f89

  • SHA256

    61c8d219d29296ed0d06afdcb43f450485886cf7b24879ddec72b04d977859b6

  • SHA512

    056a755a166b7a74f08ae81bfcc219ddabceb9645c8e70788b443f3f5ad820ca333748eb55e347cf5f5a6ab0e43da45dab423690b0af1f9b5a9858bbe2bfd2e3

  • SSDEEP

    12288:v6kFXF2u9rSgXPDV4JSrX0rLVRZt0kJrZKxFvaoWSSbg1OS:ykFVx54JGX0rLVLt0Lx9WSV1h

Malware Config

Targets

    • Target

      61c8d219d29296ed0d06afdcb43f450485886cf7b24879ddec72b04d977859b6N

    • Size

      708KB

    • MD5

      08e9e6a30e19dabdb1d0e7a4ec72d2f0

    • SHA1

      41fa3bc692426853e0264456016059dd9bb60f89

    • SHA256

      61c8d219d29296ed0d06afdcb43f450485886cf7b24879ddec72b04d977859b6

    • SHA512

      056a755a166b7a74f08ae81bfcc219ddabceb9645c8e70788b443f3f5ad820ca333748eb55e347cf5f5a6ab0e43da45dab423690b0af1f9b5a9858bbe2bfd2e3

    • SSDEEP

      12288:v6kFXF2u9rSgXPDV4JSrX0rLVRZt0kJrZKxFvaoWSSbg1OS:ykFVx54JGX0rLVLt0Lx9WSV1h

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks