General

  • Target

    MEmu-setup-abroad-07ea07f6.exe

  • Size

    136.7MB

  • Sample

    250111-17dbbavkcn

  • MD5

    b49f6bf83d55d8dd1455cc7a0383c0d2

  • SHA1

    bfb396d0605e31b385c7d2b85da36ef86129fb8c

  • SHA256

    07ea07f69e3b0765fd22dd87d9919dd3aa322bbaaba725c35b6c087e6718d869

  • SHA512

    208e98c0e3c4f85beb81bc04900baf0ada2ee7e7e9b8eaee5894557599067e6bd363fef5501a237bcf255da8557f5745119c021d918a6539fa0620bae2e6c60a

  • SSDEEP

    3145728:YhbFu8Q+I+MeooQsFecmasI8xTcawkYb+WsqAJnWJA7PUW:Y+EdnsI8Nct4nsWUW

Malware Config

Targets

    • Target

      MEmu-setup-abroad-07ea07f6.exe

    • Size

      136.7MB

    • MD5

      b49f6bf83d55d8dd1455cc7a0383c0d2

    • SHA1

      bfb396d0605e31b385c7d2b85da36ef86129fb8c

    • SHA256

      07ea07f69e3b0765fd22dd87d9919dd3aa322bbaaba725c35b6c087e6718d869

    • SHA512

      208e98c0e3c4f85beb81bc04900baf0ada2ee7e7e9b8eaee5894557599067e6bd363fef5501a237bcf255da8557f5745119c021d918a6539fa0620bae2e6c60a

    • SSDEEP

      3145728:YhbFu8Q+I+MeooQsFecmasI8xTcawkYb+WsqAJnWJA7PUW:Y+EdnsI8Nct4nsWUW

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks