General

  • Target

    3c5cc972c266de29ffa7beb180c44d6bb3f348a3da8a1eea896421fe264a25de

  • Size

    3.0MB

  • Sample

    220703-jk11esaghp

  • MD5

    a74d4b8f7b8648b779d9da2d3dc1455c

  • SHA1

    0a891baee4e7be331f2bc1320134bda0305ef087

  • SHA256

    3c5cc972c266de29ffa7beb180c44d6bb3f348a3da8a1eea896421fe264a25de

  • SHA512

    933cd96723d3e27f5493f999e86d32dab7b13e3747fae3c33189470311a22a90c504d6aa9fcdf200a6385004de5725282e876f67c20ac34f2d742df108a07c00

Score
8/10

Malware Config

Targets

    • Target

      3c5cc972c266de29ffa7beb180c44d6bb3f348a3da8a1eea896421fe264a25de

    • Size

      3.0MB

    • MD5

      a74d4b8f7b8648b779d9da2d3dc1455c

    • SHA1

      0a891baee4e7be331f2bc1320134bda0305ef087

    • SHA256

      3c5cc972c266de29ffa7beb180c44d6bb3f348a3da8a1eea896421fe264a25de

    • SHA512

      933cd96723d3e27f5493f999e86d32dab7b13e3747fae3c33189470311a22a90c504d6aa9fcdf200a6385004de5725282e876f67c20ac34f2d742df108a07c00

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks