General

  • Target

    7b9518cda24026fa2c1c7b8729845f54c5fee256ff0036b73289e8136d389443

  • Size

    1.9MB

  • Sample

    210302-s4q24l9zss

  • MD5

    af34ac86e28c28c47a1a511fb046f3c9

  • SHA1

    5bdab8a5bc4afb8650bca4cdbf2b4150b0e38b35

  • SHA256

    7b9518cda24026fa2c1c7b8729845f54c5fee256ff0036b73289e8136d389443

  • SHA512

    2b6edfcfa3e7fe5513eb6e58240fbe5c2c58a75161f3d1425370bc71e2fded9f6ec1dd0bda13c53680382d4b1470d5e532a9c7f6129d5f6ae8bb3f003f94a4e8

Score
10/10

Malware Config

Targets

    • Target

      7b9518cda24026fa2c1c7b8729845f54c5fee256ff0036b73289e8136d389443

    • Size

      1.9MB

    • MD5

      af34ac86e28c28c47a1a511fb046f3c9

    • SHA1

      5bdab8a5bc4afb8650bca4cdbf2b4150b0e38b35

    • SHA256

      7b9518cda24026fa2c1c7b8729845f54c5fee256ff0036b73289e8136d389443

    • SHA512

      2b6edfcfa3e7fe5513eb6e58240fbe5c2c58a75161f3d1425370bc71e2fded9f6ec1dd0bda13c53680382d4b1470d5e532a9c7f6129d5f6ae8bb3f003f94a4e8

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks