General

  • Target

    ef16fd0d3611a2f285d9d008426f90a2

  • Size

    772KB

  • Sample

    201214-k77lzhsq5n

  • MD5

    ef16fd0d3611a2f285d9d008426f90a2

  • SHA1

    680dba454d81ceaa195f000d0300873b5a34c5ba

  • SHA256

    4bf63224813fd60a209f4f2ae745144eab632f822eb53992d5f808fc76446c40

  • SHA512

    7b6e01cb0a5abaf54c9941bcc49a06680a5a5baa7f7340a9bf8a892302f7bcd87ea6a13a31705444e83306652fa1107c28eee9c9fc4bdf127ece597ca1fb6074

Score
10/10

Malware Config

Targets

    • Target

      ef16fd0d3611a2f285d9d008426f90a2

    • Size

      772KB

    • MD5

      ef16fd0d3611a2f285d9d008426f90a2

    • SHA1

      680dba454d81ceaa195f000d0300873b5a34c5ba

    • SHA256

      4bf63224813fd60a209f4f2ae745144eab632f822eb53992d5f808fc76446c40

    • SHA512

      7b6e01cb0a5abaf54c9941bcc49a06680a5a5baa7f7340a9bf8a892302f7bcd87ea6a13a31705444e83306652fa1107c28eee9c9fc4bdf127ece597ca1fb6074

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks