General

  • Target

    55e63d0cf11f9b904c519fdc234f4e5ef516122b13846c4ca803df55035b6bbd

  • Size

    1.1MB

  • Sample

    210302-lftnrkzmbn

  • MD5

    1f445e5515996ade7a91956ba3e13e18

  • SHA1

    3d2f962efd39d7f7aa8acebafe2e7d74eb778cf7

  • SHA256

    55e63d0cf11f9b904c519fdc234f4e5ef516122b13846c4ca803df55035b6bbd

  • SHA512

    7a74c129db44f07c829ff23fee056edba1d90b1c0e2c297cf62b537c5e64096279550c1c11185471b7c632979b3d539a124411afb7f42a8e3c583b1d50c8bf59

Score
10/10

Malware Config

Targets

    • Target

      55e63d0cf11f9b904c519fdc234f4e5ef516122b13846c4ca803df55035b6bbd

    • Size

      1.1MB

    • MD5

      1f445e5515996ade7a91956ba3e13e18

    • SHA1

      3d2f962efd39d7f7aa8acebafe2e7d74eb778cf7

    • SHA256

      55e63d0cf11f9b904c519fdc234f4e5ef516122b13846c4ca803df55035b6bbd

    • SHA512

      7a74c129db44f07c829ff23fee056edba1d90b1c0e2c297cf62b537c5e64096279550c1c11185471b7c632979b3d539a124411afb7f42a8e3c583b1d50c8bf59

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks