General

  • Target

    de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

  • Size

    231KB

  • Sample

    210505-9yaxxyw9r6

  • MD5

    6b699598d9b88107f16ea4977a39dd2c

  • SHA1

    28ae2c9fe6ae8ca1e891d32094e159684363cef1

  • SHA256

    de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

  • SHA512

    668ca675242b843f7781df225c4156b2b7722b7f7a5afe9233e45ff587546ac5d35f282f43fc518228ae7591290f4bb0da5aada839bcfe1ee255f98c694d0050

Score
10/10

Malware Config

Targets

    • Target

      de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

    • Size

      231KB

    • MD5

      6b699598d9b88107f16ea4977a39dd2c

    • SHA1

      28ae2c9fe6ae8ca1e891d32094e159684363cef1

    • SHA256

      de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

    • SHA512

      668ca675242b843f7781df225c4156b2b7722b7f7a5afe9233e45ff587546ac5d35f282f43fc518228ae7591290f4bb0da5aada839bcfe1ee255f98c694d0050

    Score
    10/10
    • Modifies system executable filetype association

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks