General

  • Target

    c59d0b1d852b75509e56141eddeee628b70af8b2878a5ef7933997d9231c0d94

  • Size

    2.7MB

  • Sample

    220701-jdlbdsaahl

  • MD5

    3e66cb62e675b54c3fb1dc40300b003c

  • SHA1

    9df68c428446285cc8c5ee02b9277a1ea66afc84

  • SHA256

    c59d0b1d852b75509e56141eddeee628b70af8b2878a5ef7933997d9231c0d94

  • SHA512

    6f9fc50061f6681cd33d1135a7cef3194b426089f3637e3dee4776dfe2a8551826b3415b75ce2b8d87f5279233ec5576e93717dcee8b38dff8c39db9ddb2cb26

Score
8/10

Malware Config

Targets

    • Target

      c59d0b1d852b75509e56141eddeee628b70af8b2878a5ef7933997d9231c0d94

    • Size

      2.7MB

    • MD5

      3e66cb62e675b54c3fb1dc40300b003c

    • SHA1

      9df68c428446285cc8c5ee02b9277a1ea66afc84

    • SHA256

      c59d0b1d852b75509e56141eddeee628b70af8b2878a5ef7933997d9231c0d94

    • SHA512

      6f9fc50061f6681cd33d1135a7cef3194b426089f3637e3dee4776dfe2a8551826b3415b75ce2b8d87f5279233ec5576e93717dcee8b38dff8c39db9ddb2cb26

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks