General

  • Target

    WinLocker.exe

  • Size

    2.5MB

  • Sample

    241121-slbxcssrgw

  • MD5

    8db22c05021308aa1f21e00b7c754510

  • SHA1

    df1a966bcee343fcc47466a7987d439d3e7fbc6d

  • SHA256

    4f3dc347f531ef6a408c5f432952a458a0ba635644647e9a8de1982f5428dce2

  • SHA512

    53e3c137710ebcdfff7c8caf75235fdcf230dc980829978c31226b4a3e356b8717d9e94e5aa6e70855d89e734de9db892dee759f7201bda2c81a172e69bf6c9c

  • SSDEEP

    49152:7zf6V1jqp9ekTD4SxfHLqY+xKkmyLW5RhM0glT:7zyV0pJfOtIFIlT

Malware Config

Targets

    • Target

      WinLocker.exe

    • Size

      2.5MB

    • MD5

      8db22c05021308aa1f21e00b7c754510

    • SHA1

      df1a966bcee343fcc47466a7987d439d3e7fbc6d

    • SHA256

      4f3dc347f531ef6a408c5f432952a458a0ba635644647e9a8de1982f5428dce2

    • SHA512

      53e3c137710ebcdfff7c8caf75235fdcf230dc980829978c31226b4a3e356b8717d9e94e5aa6e70855d89e734de9db892dee759f7201bda2c81a172e69bf6c9c

    • SSDEEP

      49152:7zf6V1jqp9ekTD4SxfHLqY+xKkmyLW5RhM0glT:7zyV0pJfOtIFIlT

    • UAC bypass

    • Event Triggered Execution: Image File Execution Options Injection

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks