General
-
Target
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll
-
Size
171KB
-
Sample
241119-p6c4daxaqp
-
MD5
129a4a5be1e9cff7a54ebf6b80793986
-
SHA1
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d
-
SHA256
a80d66f921a6f59756560ae3c3afd26fdd43e26f30ecabdd729c80301a8d08ce
-
SHA512
2d71d88ff8c8854bacbd6689abd54e739c482b5605295bd9ffea1b06078b4e9f1f6f1072bb03b9cf255cd50a8f28da9bd762c3c3ca950d7165932e89940611fd
-
SSDEEP
3072:R2Iz9CI8mUOtDDPwLkBLXLDFkKmvzXBpLHYmmO1QezRd7UcPa1xMjM7A:Rjz9X8mXGUXVPmr9mOzRd7UcPKoMk
Static task
static1
Behavioral task
behavioral1
Sample
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll
-
Size
171KB
-
MD5
129a4a5be1e9cff7a54ebf6b80793986
-
SHA1
dba9c2268b1ee590b4b3b456642c6c7aa6993b9d
-
SHA256
a80d66f921a6f59756560ae3c3afd26fdd43e26f30ecabdd729c80301a8d08ce
-
SHA512
2d71d88ff8c8854bacbd6689abd54e739c482b5605295bd9ffea1b06078b4e9f1f6f1072bb03b9cf255cd50a8f28da9bd762c3c3ca950d7165932e89940611fd
-
SSDEEP
3072:R2Iz9CI8mUOtDDPwLkBLXLDFkKmvzXBpLHYmmO1QezRd7UcPa1xMjM7A:Rjz9X8mXGUXVPmr9mOzRd7UcPKoMk
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1