General

  • Target

    c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b

  • Size

    41KB

  • Sample

    220520-2a56hafac7

  • MD5

    2187c3751c66ebd51e672ecc18c07965

  • SHA1

    a287ec68b31443e15d4d01f0804cc509c1f2f719

  • SHA256

    c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b

  • SHA512

    cccaa3f996e729cd3246bbba5995a54bc708f418ae34bb833078326a33ffac9a4d821cdda8e51660577b6b1531f3b11128eb7fe07e091b8242f44281adc7db92

Score
8/10

Malware Config

Targets

    • Target

      c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b

    • Size

      41KB

    • MD5

      2187c3751c66ebd51e672ecc18c07965

    • SHA1

      a287ec68b31443e15d4d01f0804cc509c1f2f719

    • SHA256

      c678d05e7afa866f3bb21a5d04aa51cd494fa8ce7367912d164e62d14a8b510b

    • SHA512

      cccaa3f996e729cd3246bbba5995a54bc708f418ae34bb833078326a33ffac9a4d821cdda8e51660577b6b1531f3b11128eb7fe07e091b8242f44281adc7db92

    Score
    8/10
    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks