General

  • Target

    5933998493433856.zip

  • Size

    93KB

  • Sample

    210302-yd528n6r66

  • MD5

    ce2e05ca651c83dad84bfd5c217c0dcb

  • SHA1

    0e802d6c57f58b6868cdda9a4b0920121aa49f62

  • SHA256

    fb9219adc5725db0f843ef10061af02704aaa4ed77a721588a143f4216d56876

  • SHA512

    afee66ba3f5cb86fa325002f6dd58230089d1375b349fcd177d84520056e578e6ac9cf6db9499b14e8097a9df81bca06f0117d107267430220359f4da9335a88

Score
9/10

Malware Config

Targets

    • Target

      0000b34d7ef873076e73a06fc38822a9755cbaba3acbd6bd472f423e31c4a704

    • Size

      130KB

    • MD5

      44f4d2bf3b519689dba73d7b919ec101

    • SHA1

      49b13ca5343ad050c12d384a3555d868c6b4744d

    • SHA256

      0000b34d7ef873076e73a06fc38822a9755cbaba3acbd6bd472f423e31c4a704

    • SHA512

      3eae01d328d0f4db5c0363f8c0a118ccf5de0d0872929b2c3258954c5120afc472ff973a321c0d14c0b933785f7c029836ea315831b08f186074b84ad90a63c3

    Score
    9/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Modifies AppInit DLL entries

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks