General
-
Target
stinger64.exe
-
Size
46.8MB
-
Sample
241204-d2b5qszkgy
-
MD5
8b2e581985d25d62f445e35272b0166c
-
SHA1
b9da986997c504d41dbcb2ba092950fb85d8c423
-
SHA256
c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271
-
SHA512
5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c
-
SSDEEP
786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a
Static task
static1
Behavioral task
behavioral1
Sample
stinger64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
stinger64.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
stinger64.exe
-
Size
46.8MB
-
MD5
8b2e581985d25d62f445e35272b0166c
-
SHA1
b9da986997c504d41dbcb2ba092950fb85d8c423
-
SHA256
c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271
-
SHA512
5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c
-
SSDEEP
786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Indicator Removal
1Clear Persistence
1Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1