General
-
Target
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll
-
Size
128KB
-
Sample
241120-dd9q4azdlp
-
MD5
82b8e2d9302f9ddf403b5a7c608ab4b7
-
SHA1
b2d7c36479fdec9065b4090159f1c22ce3ae78a6
-
SHA256
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160
-
SHA512
199d62020dcef9b01cc688a5dda52598f276201bf75291010c2ff7588fd326393023c40faedcf1771180bc5cde51b5801ae4571b4c2a064680e6af2a686b8257
-
SSDEEP
3072:pE+8OKVuMxgMLQ813qgy0ExYhnMzJkt0lDMKPX:18NcMxdLQ81amJMF7eKv
Static task
static1
Behavioral task
behavioral1
Sample
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll
-
Size
128KB
-
MD5
82b8e2d9302f9ddf403b5a7c608ab4b7
-
SHA1
b2d7c36479fdec9065b4090159f1c22ce3ae78a6
-
SHA256
7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160
-
SHA512
199d62020dcef9b01cc688a5dda52598f276201bf75291010c2ff7588fd326393023c40faedcf1771180bc5cde51b5801ae4571b4c2a064680e6af2a686b8257
-
SSDEEP
3072:pE+8OKVuMxgMLQ813qgy0ExYhnMzJkt0lDMKPX:18NcMxdLQ81amJMF7eKv
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1