General

  • Target

    digital.-.online C∩RWROI┐A∩┐┐┐┐M╜∩╜┐╜X╜╜A╜S┐OYW╜┐N∩YMA┐T∩╜Z∩A∩╜CHZA.msi

  • Size

    268KB

  • Sample

    210308-1pvvnxtfjx

  • MD5

    3cdb1d26ef24c423f83ba602129b5b35

  • SHA1

    ddc88f08d80382e733c4d9197ae08f795e0601f9

  • SHA256

    f364525bd719aefacb0453cb9eb8814d8c67b87ce0928aed13196936115f9280

  • SHA512

    b935ab83d77163d5915e8c94cd2a7fe97c89f4730a7ac77724aa7f4bec16546e57d66b4c2ffa3cb014708a26b3545a226da041f837777fddaac0d22adba20267

Malware Config

Targets

    • Target

      digital.-.online C∩RWROI┐A∩┐┐┐┐M╜∩╜┐╜X╜╜A╜S┐OYW╜┐N∩YMA┐T∩╜Z∩A∩╜CHZA.msi

    • Size

      268KB

    • MD5

      3cdb1d26ef24c423f83ba602129b5b35

    • SHA1

      ddc88f08d80382e733c4d9197ae08f795e0601f9

    • SHA256

      f364525bd719aefacb0453cb9eb8814d8c67b87ce0928aed13196936115f9280

    • SHA512

      b935ab83d77163d5915e8c94cd2a7fe97c89f4730a7ac77724aa7f4bec16546e57d66b4c2ffa3cb014708a26b3545a226da041f837777fddaac0d22adba20267

    • Blocklisted process makes network request

    • Modifies WinLogon to allow AutoLogon

      Enables rebooting of the machine without requiring login credentials.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks