General

  • Target

    020d2ea5de12948f46dd3f72c69cb6fe2eba071649ca73c1a108a978eb5d30dc

  • Size

    553KB

  • Sample

    241016-d1445avbql

  • MD5

    bae8fe20dcec7d2ddd91b4e62e73625c

  • SHA1

    2bc4f88ab511976b873ef559ae051bee4fa3c051

  • SHA256

    020d2ea5de12948f46dd3f72c69cb6fe2eba071649ca73c1a108a978eb5d30dc

  • SHA512

    b4e788b5876d429d1c8e41a6faad654a821277b390085a6d6730dab645aa161de6a9ddfe7db2bc2dcef7482fc1a9a5dae7c1b12a37834938e669ac88995e2b0f

  • SSDEEP

    12288:rc1d4DNdhT6VerOwSRQWfgAk9oZzG96bZqsYTdKJ:raCDNdh2VeKnRPfgAk6ZzGCq0

Score
7/10

Malware Config

Targets

    • Target

      020d2ea5de12948f46dd3f72c69cb6fe2eba071649ca73c1a108a978eb5d30dc

    • Size

      553KB

    • MD5

      bae8fe20dcec7d2ddd91b4e62e73625c

    • SHA1

      2bc4f88ab511976b873ef559ae051bee4fa3c051

    • SHA256

      020d2ea5de12948f46dd3f72c69cb6fe2eba071649ca73c1a108a978eb5d30dc

    • SHA512

      b4e788b5876d429d1c8e41a6faad654a821277b390085a6d6730dab645aa161de6a9ddfe7db2bc2dcef7482fc1a9a5dae7c1b12a37834938e669ac88995e2b0f

    • SSDEEP

      12288:rc1d4DNdhT6VerOwSRQWfgAk9oZzG96bZqsYTdKJ:raCDNdh2VeKnRPfgAk6ZzGCq0

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks