General

  • Target

    2024-11-09_27d032411a42c6ba2d04dd91bf4020c1_avoslocker_luca-stealer

  • Size

    4.4MB

  • Sample

    241109-ngjzystdje

  • MD5

    27d032411a42c6ba2d04dd91bf4020c1

  • SHA1

    e6da3bd169288d1f0dfdb5efd78d15c2c854c0f8

  • SHA256

    e35ed71c2af051bcfa338a2595f1b30f310bfc20502d9389c933e28a538f5bd3

  • SHA512

    8b5ceb5915bfdbba6ab6bc64734cfa3c1c638e60a9b60404b442733717abbddcc234f080b35be6c42b4ac8654b958ee99a4259bb8a9d6784f317bca42542e0bf

  • SSDEEP

    98304:iWqq+Mb+KyWv5rIy5YFWAvwznaTfyYsVQqEuV6xAdznfAW3cnw:iWaLWvpIy5YPvwznZNQqEuVeKL3cw

Malware Config

Targets

    • Target

      2024-11-09_27d032411a42c6ba2d04dd91bf4020c1_avoslocker_luca-stealer

    • Size

      4.4MB

    • MD5

      27d032411a42c6ba2d04dd91bf4020c1

    • SHA1

      e6da3bd169288d1f0dfdb5efd78d15c2c854c0f8

    • SHA256

      e35ed71c2af051bcfa338a2595f1b30f310bfc20502d9389c933e28a538f5bd3

    • SHA512

      8b5ceb5915bfdbba6ab6bc64734cfa3c1c638e60a9b60404b442733717abbddcc234f080b35be6c42b4ac8654b958ee99a4259bb8a9d6784f317bca42542e0bf

    • SSDEEP

      98304:iWqq+Mb+KyWv5rIy5YFWAvwznaTfyYsVQqEuV6xAdznfAW3cnw:iWaLWvpIy5YPvwznZNQqEuVeKL3cw

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks