General

  • Target

    455e865f84463236689afd392dbbf1ef0602a946e39ad7554e96a09f2f0b40d3

  • Size

    2.2MB

  • Sample

    220703-jtajtsdch7

  • MD5

    3c4d0739cc19e1b4b1b5a564b75ef535

  • SHA1

    e445f9fe59835292c7fbae515c526782719dd051

  • SHA256

    455e865f84463236689afd392dbbf1ef0602a946e39ad7554e96a09f2f0b40d3

  • SHA512

    3bb16c2d1d3b4348f9220367c482ef1fbbc345164006b6b8b426af6708e01a49ba3232cd26c47aa7236ae6a1ce1d110e7c715ae73743f2ed18234bcc0082bfb6

Score
8/10

Malware Config

Targets

    • Target

      455e865f84463236689afd392dbbf1ef0602a946e39ad7554e96a09f2f0b40d3

    • Size

      2.2MB

    • MD5

      3c4d0739cc19e1b4b1b5a564b75ef535

    • SHA1

      e445f9fe59835292c7fbae515c526782719dd051

    • SHA256

      455e865f84463236689afd392dbbf1ef0602a946e39ad7554e96a09f2f0b40d3

    • SHA512

      3bb16c2d1d3b4348f9220367c482ef1fbbc345164006b6b8b426af6708e01a49ba3232cd26c47aa7236ae6a1ce1d110e7c715ae73743f2ed18234bcc0082bfb6

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks