General

  • Target

    a97cefa589546b0bbde75f131db43d0fb7dfb9c43b9b475e5ee8f13f9c98859d

  • Size

    928KB

  • Sample

    210110-9c2vg42jxs

  • MD5

    6e613af5c36988a9b922974192f1f985

  • SHA1

    00e43809bdcb30975de249de5abdf39be33c0411

  • SHA256

    a97cefa589546b0bbde75f131db43d0fb7dfb9c43b9b475e5ee8f13f9c98859d

  • SHA512

    ee04d01925a27fc65520213d69e88925e78c0ea6f2a276c16a703145161f26ff1dbc0d33928ef4a539dff39080477d8dbc9c0c8c3027ed930d21c50d16c6a364

Score
10/10

Malware Config

Targets

    • Target

      a97cefa589546b0bbde75f131db43d0fb7dfb9c43b9b475e5ee8f13f9c98859d

    • Size

      928KB

    • MD5

      6e613af5c36988a9b922974192f1f985

    • SHA1

      00e43809bdcb30975de249de5abdf39be33c0411

    • SHA256

      a97cefa589546b0bbde75f131db43d0fb7dfb9c43b9b475e5ee8f13f9c98859d

    • SHA512

      ee04d01925a27fc65520213d69e88925e78c0ea6f2a276c16a703145161f26ff1dbc0d33928ef4a539dff39080477d8dbc9c0c8c3027ed930d21c50d16c6a364

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks