General

  • Target

    95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9

  • Size

    2.4MB

  • Sample

    241006-af667s1gkg

  • MD5

    64b707dff52a3fe4b1a1b52ed5494055

  • SHA1

    dd9e47d9b5fbe73319cde692406014d9520eb520

  • SHA256

    95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9

  • SHA512

    7ba2b77b54e13f5db1f4a284f9c5aaa90325742a3ff751355f84d3e514e022fac1702554eecc3317e9fe40f703ea130ffd4acdda17a06e31fb0051920b32b8fc

  • SSDEEP

    49152:oLKhNrl+LxMHBTnqHhbNFS9r7g2nSlKXTsJali+CU4Xp5JihRe:RDZ+NeqHhx0Vg2/Ibq4XEhRe

Malware Config

Targets

    • Target

      95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9

    • Size

      2.4MB

    • MD5

      64b707dff52a3fe4b1a1b52ed5494055

    • SHA1

      dd9e47d9b5fbe73319cde692406014d9520eb520

    • SHA256

      95df11de18e47fdd290aad16a9049a0e8e01e54a9e053ed145d3e76d438ac9f9

    • SHA512

      7ba2b77b54e13f5db1f4a284f9c5aaa90325742a3ff751355f84d3e514e022fac1702554eecc3317e9fe40f703ea130ffd4acdda17a06e31fb0051920b32b8fc

    • SSDEEP

      49152:oLKhNrl+LxMHBTnqHhbNFS9r7g2nSlKXTsJali+CU4Xp5JihRe:RDZ+NeqHhx0Vg2/Ibq4XEhRe

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks