General

  • Target

    killa.exe

  • Size

    251KB

  • Sample

    241203-tbee6sxlgr

  • MD5

    78358a69077076025340aab9d5969a81

  • SHA1

    1180e9133be91c474cc3da3e77f612abcc5ca6e8

  • SHA256

    aa8fa515fa6a86b433a0445145ed4700c7f7141689520629347ba8a9c2e28cd9

  • SHA512

    7140b090854761a4e1bf243f4355f1d3ad83a44193075a474bc0b006a980472215ff7424ce264f7e875b07b49b94a7a60256ff612d093f906bd02a6492395280

  • SSDEEP

    6144:xa0T3uQwzIn51Fc/SQPbg8s3TZ4crBqB1:B08rkfYTV8B1

Malware Config

Targets

    • Target

      killa.exe

    • Size

      251KB

    • MD5

      78358a69077076025340aab9d5969a81

    • SHA1

      1180e9133be91c474cc3da3e77f612abcc5ca6e8

    • SHA256

      aa8fa515fa6a86b433a0445145ed4700c7f7141689520629347ba8a9c2e28cd9

    • SHA512

      7140b090854761a4e1bf243f4355f1d3ad83a44193075a474bc0b006a980472215ff7424ce264f7e875b07b49b94a7a60256ff612d093f906bd02a6492395280

    • SSDEEP

      6144:xa0T3uQwzIn51Fc/SQPbg8s3TZ4crBqB1:B08rkfYTV8B1

    • Stops running service(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks