General

  • Target

    covid21.exe

  • Size

    2.0MB

  • Sample

    210115-d59xs5xq5e

  • MD5

    1a2e2d295e04f74437652dc9b8a2d03c

  • SHA1

    e3565983ee402856c2cf4eec2ac6ff9636443fe9

  • SHA256

    a078251c61a4f90bf60da47d99cea465be5d44057684d681fb3d94a20d2025bd

  • SHA512

    7d5130ad41c4903aa66fc00b22bc3799ade4b6c3bb82db9aead43158aa03165159b59f8c16d8cf68fb297e69e6a13acc9708669d5916fe52b9254330c1f14df2

Malware Config

Targets

    • Target

      covid21.exe

    • Size

      2.0MB

    • MD5

      1a2e2d295e04f74437652dc9b8a2d03c

    • SHA1

      e3565983ee402856c2cf4eec2ac6ff9636443fe9

    • SHA256

      a078251c61a4f90bf60da47d99cea465be5d44057684d681fb3d94a20d2025bd

    • SHA512

      7d5130ad41c4903aa66fc00b22bc3799ade4b6c3bb82db9aead43158aa03165159b59f8c16d8cf68fb297e69e6a13acc9708669d5916fe52b9254330c1f14df2

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Impact

Defacement

1
T1491

Tasks