General
-
Target
WinLocker.exe
-
Size
2.5MB
-
Sample
241121-slbxcssrgw
-
MD5
8db22c05021308aa1f21e00b7c754510
-
SHA1
df1a966bcee343fcc47466a7987d439d3e7fbc6d
-
SHA256
4f3dc347f531ef6a408c5f432952a458a0ba635644647e9a8de1982f5428dce2
-
SHA512
53e3c137710ebcdfff7c8caf75235fdcf230dc980829978c31226b4a3e356b8717d9e94e5aa6e70855d89e734de9db892dee759f7201bda2c81a172e69bf6c9c
-
SSDEEP
49152:7zf6V1jqp9ekTD4SxfHLqY+xKkmyLW5RhM0glT:7zyV0pJfOtIFIlT
Static task
static1
Behavioral task
behavioral1
Sample
WinLocker.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
WinLocker.exe
-
Size
2.5MB
-
MD5
8db22c05021308aa1f21e00b7c754510
-
SHA1
df1a966bcee343fcc47466a7987d439d3e7fbc6d
-
SHA256
4f3dc347f531ef6a408c5f432952a458a0ba635644647e9a8de1982f5428dce2
-
SHA512
53e3c137710ebcdfff7c8caf75235fdcf230dc980829978c31226b4a3e356b8717d9e94e5aa6e70855d89e734de9db892dee759f7201bda2c81a172e69bf6c9c
-
SSDEEP
49152:7zf6V1jqp9ekTD4SxfHLqY+xKkmyLW5RhM0glT:7zyV0pJfOtIFIlT
Score10/10-
Event Triggered Execution: Image File Execution Options Injection
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1