General

  • Target

    9f3f50841b4d33938a0e25f1046596096324d6582d7f783ee10ad7b8ed9c43e2

  • Size

    108KB

  • Sample

    210515-vbsjjzejna

  • MD5

    cf508c5bd71982370a008fb731c0ef2a

  • SHA1

    b77f6c9225fcf6ab8feb4feb4cb9f069d7298efe

  • SHA256

    9f3f50841b4d33938a0e25f1046596096324d6582d7f783ee10ad7b8ed9c43e2

  • SHA512

    1542e8c2ed74e9f8f7a133bec7bd3b98a8927513693b56c3516bf129469e8a11573f7d302bbb134b1aa6ca96ca2cb2b8308a38ed308af326279bffece9837811

Malware Config

Targets

    • Target

      9f3f50841b4d33938a0e25f1046596096324d6582d7f783ee10ad7b8ed9c43e2

    • Size

      108KB

    • MD5

      cf508c5bd71982370a008fb731c0ef2a

    • SHA1

      b77f6c9225fcf6ab8feb4feb4cb9f069d7298efe

    • SHA256

      9f3f50841b4d33938a0e25f1046596096324d6582d7f783ee10ad7b8ed9c43e2

    • SHA512

      1542e8c2ed74e9f8f7a133bec7bd3b98a8927513693b56c3516bf129469e8a11573f7d302bbb134b1aa6ca96ca2cb2b8308a38ed308af326279bffece9837811

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables cmd.exe use via registry modification

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks