General

  • Target

    184019e0e6790c7d4b2a9ce9724af0c7288d009f05adaabed0b5976d0ebac7ad

  • Size

    1.1MB

  • Sample

    210228-b369zqr8xn

  • MD5

    ba092abffb51298232ef53550d150654

  • SHA1

    ecc47a74026d2b2c0e45341bdd2ea32c4b91ff81

  • SHA256

    184019e0e6790c7d4b2a9ce9724af0c7288d009f05adaabed0b5976d0ebac7ad

  • SHA512

    a8e7b19a80b2312b3051aab022b57e454d8bfbee6f618512d238c10dacb789d268342a83a90df6d5767905155568fa316bf76caace257c4a67c80a91037b1777

Score
10/10

Malware Config

Targets

    • Target

      184019e0e6790c7d4b2a9ce9724af0c7288d009f05adaabed0b5976d0ebac7ad

    • Size

      1.1MB

    • MD5

      ba092abffb51298232ef53550d150654

    • SHA1

      ecc47a74026d2b2c0e45341bdd2ea32c4b91ff81

    • SHA256

      184019e0e6790c7d4b2a9ce9724af0c7288d009f05adaabed0b5976d0ebac7ad

    • SHA512

      a8e7b19a80b2312b3051aab022b57e454d8bfbee6f618512d238c10dacb789d268342a83a90df6d5767905155568fa316bf76caace257c4a67c80a91037b1777

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks