General

  • Target

    4_2342234575679328584.msi

  • Size

    266KB

  • Sample

    210311-mekbk527e2

  • MD5

    7c07a45d87cc4651a1fd84ec84a26305

  • SHA1

    a2c9403bd3c9482cf666bfef2261e0625d1b5132

  • SHA256

    53cacd3f0415f660597b5636056c0303fb9559ce5a8d9197930ef94c273be306

  • SHA512

    e60e20bdd286bde8828679a8176695119c7bb4d9e679d2ba746f272e1cf868e1a35eb2afb4e0eef15e33cf3927293110e4544d111f5c5c3dbdecea4101414684

Malware Config

Targets

    • Target

      4_2342234575679328584.msi

    • Size

      266KB

    • MD5

      7c07a45d87cc4651a1fd84ec84a26305

    • SHA1

      a2c9403bd3c9482cf666bfef2261e0625d1b5132

    • SHA256

      53cacd3f0415f660597b5636056c0303fb9559ce5a8d9197930ef94c273be306

    • SHA512

      e60e20bdd286bde8828679a8176695119c7bb4d9e679d2ba746f272e1cf868e1a35eb2afb4e0eef15e33cf3927293110e4544d111f5c5c3dbdecea4101414684

    • Blocklisted process makes network request

    • Modifies WinLogon to allow AutoLogon

      Enables rebooting of the machine without requiring login credentials.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks