General
-
Target
killa.exe
-
Size
251KB
-
Sample
241203-tervnsskcv
-
MD5
8343718fdc45a64b62c4102230a555c2
-
SHA1
d255b1024ba8547ad0e0c5e02fd146fc57dac6a2
-
SHA256
289c320c2872d96997d8ff86e6dbd22e854fb544974041a50694e6cec366bed4
-
SHA512
37c8cd726c8099b69283b6d2461c5089037b4a3b414858ec6f8289135a303d12d154a5a4add23d7e6990c83c731b858700f470a23fe49ae442c7c120bf6ee1e4
-
SSDEEP
6144:eakjwyvvgH70VjobSgPiA5Bc3TZ4crB6B1:K4wQvKTVsB1
Static task
static1
Behavioral task
behavioral1
Sample
killa.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
killa.exe
-
Size
251KB
-
MD5
8343718fdc45a64b62c4102230a555c2
-
SHA1
d255b1024ba8547ad0e0c5e02fd146fc57dac6a2
-
SHA256
289c320c2872d96997d8ff86e6dbd22e854fb544974041a50694e6cec366bed4
-
SHA512
37c8cd726c8099b69283b6d2461c5089037b4a3b414858ec6f8289135a303d12d154a5a4add23d7e6990c83c731b858700f470a23fe49ae442c7c120bf6ee1e4
-
SSDEEP
6144:eakjwyvvgH70VjobSgPiA5Bc3TZ4crB6B1:K4wQvKTVsB1
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1