General

  • Target

    DependencyPropertyGenerator.Core.dll

  • Size

    40KB

  • Sample

    240629-zd6kbsygpq

  • MD5

    d9732473b12f627c54c5c71849f99e19

  • SHA1

    1fb1e2f5a4518571f7824001f6fa39def92c8df4

  • SHA256

    cf1c009fb3dfc12623d83b513e5bab0e98108a00d507ec3d5cac44386f4f4368

  • SHA512

    51e604128522429635cfc8af582b437f9d4642ce23f8b1a7167d770a0dc7ff0865b6f19e0d13d0870dc5ec41715961c18522639ecd7bad92eb646418da40fe6c

  • SSDEEP

    768:Nx6IpmUNGrcwq6dfMqUxgnT6OEwsyG8mAJgvf4Fq6prG:SGmUNsJMq/VdmAJ24Eky

Score
8/10

Malware Config

Targets

    • Target

      DependencyPropertyGenerator.Core.dll

    • Size

      40KB

    • MD5

      d9732473b12f627c54c5c71849f99e19

    • SHA1

      1fb1e2f5a4518571f7824001f6fa39def92c8df4

    • SHA256

      cf1c009fb3dfc12623d83b513e5bab0e98108a00d507ec3d5cac44386f4f4368

    • SHA512

      51e604128522429635cfc8af582b437f9d4642ce23f8b1a7167d770a0dc7ff0865b6f19e0d13d0870dc5ec41715961c18522639ecd7bad92eb646418da40fe6c

    • SSDEEP

      768:Nx6IpmUNGrcwq6dfMqUxgnT6OEwsyG8mAJgvf4Fq6prG:SGmUNsJMq/VdmAJ24Eky

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks