General

  • Target

    2024-10-13_775c438223ba11dfeba1c595e6155710_powerloader_vabushky

  • Size

    54KB

  • Sample

    241013-w51avawbnq

  • MD5

    775c438223ba11dfeba1c595e6155710

  • SHA1

    35241b767938608663226a6a0eabdb09a83d5c88

  • SHA256

    d2f2733d1cc15ef3f7a373d26c4535dbfe6851276af5b82b11667aaca68b4475

  • SHA512

    6297cc42b3d69a1005790ef17627683c5708403febe0764d3a13f9d4c734f53a6e0d34192ffdea32d09e667e81b5a07ff4d7eac8521b6e3c7893fbfc5fc6f429

  • SSDEEP

    768:iGwwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPCj:iGMo36pxZUk+OeOSc/Mn3FrGI1j

Score
8/10

Malware Config

Targets

    • Target

      2024-10-13_775c438223ba11dfeba1c595e6155710_powerloader_vabushky

    • Size

      54KB

    • MD5

      775c438223ba11dfeba1c595e6155710

    • SHA1

      35241b767938608663226a6a0eabdb09a83d5c88

    • SHA256

      d2f2733d1cc15ef3f7a373d26c4535dbfe6851276af5b82b11667aaca68b4475

    • SHA512

      6297cc42b3d69a1005790ef17627683c5708403febe0764d3a13f9d4c734f53a6e0d34192ffdea32d09e667e81b5a07ff4d7eac8521b6e3c7893fbfc5fc6f429

    • SSDEEP

      768:iGwwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPCj:iGMo36pxZUk+OeOSc/Mn3FrGI1j

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks