General
-
Target
killa.exe
-
Size
251KB
-
Sample
241203-tbee6sxlgr
-
MD5
78358a69077076025340aab9d5969a81
-
SHA1
1180e9133be91c474cc3da3e77f612abcc5ca6e8
-
SHA256
aa8fa515fa6a86b433a0445145ed4700c7f7141689520629347ba8a9c2e28cd9
-
SHA512
7140b090854761a4e1bf243f4355f1d3ad83a44193075a474bc0b006a980472215ff7424ce264f7e875b07b49b94a7a60256ff612d093f906bd02a6492395280
-
SSDEEP
6144:xa0T3uQwzIn51Fc/SQPbg8s3TZ4crBqB1:B08rkfYTV8B1
Static task
static1
Behavioral task
behavioral1
Sample
killa.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
killa.exe
-
Size
251KB
-
MD5
78358a69077076025340aab9d5969a81
-
SHA1
1180e9133be91c474cc3da3e77f612abcc5ca6e8
-
SHA256
aa8fa515fa6a86b433a0445145ed4700c7f7141689520629347ba8a9c2e28cd9
-
SHA512
7140b090854761a4e1bf243f4355f1d3ad83a44193075a474bc0b006a980472215ff7424ce264f7e875b07b49b94a7a60256ff612d093f906bd02a6492395280
-
SSDEEP
6144:xa0T3uQwzIn51Fc/SQPbg8s3TZ4crBqB1:B08rkfYTV8B1
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1