General

  • Target

    2bfda6b2030993c758dec19cd3b266c7b8d8fe53616abab05bf72fccfd638d80

  • Size

    1.6MB

  • Sample

    210302-zmnstfxdea

  • MD5

    12f8e69c3c39d9991281b81577a2209b

  • SHA1

    59cd2125afbe1db777fe19030b015413c3820278

  • SHA256

    2bfda6b2030993c758dec19cd3b266c7b8d8fe53616abab05bf72fccfd638d80

  • SHA512

    47f2be03dc05c265df7a61f20571f0becb2a5639629427702953234b0126a59ba491802f1c37c6f99d8341cb88668c2579c188119a62548ee416dc009edd414e

Score
10/10

Malware Config

Targets

    • Target

      2bfda6b2030993c758dec19cd3b266c7b8d8fe53616abab05bf72fccfd638d80

    • Size

      1.6MB

    • MD5

      12f8e69c3c39d9991281b81577a2209b

    • SHA1

      59cd2125afbe1db777fe19030b015413c3820278

    • SHA256

      2bfda6b2030993c758dec19cd3b266c7b8d8fe53616abab05bf72fccfd638d80

    • SHA512

      47f2be03dc05c265df7a61f20571f0becb2a5639629427702953234b0126a59ba491802f1c37c6f99d8341cb88668c2579c188119a62548ee416dc009edd414e

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks