General

  • Target

    3c479a19dc1022dcdcc35977ba3b8cdc27105227337c19f87116f9c4d5cfdada

  • Size

    1.8MB

  • Sample

    220703-jwracsbcdn

  • MD5

    a5d67c582e7f243ea729a30bacde5485

  • SHA1

    eb2e496e266892974b410f67b0e522bcd1c3fc01

  • SHA256

    3c479a19dc1022dcdcc35977ba3b8cdc27105227337c19f87116f9c4d5cfdada

  • SHA512

    a79b16766909126dbfa7b2490352016094be7021d2deb58bd58fc08e957f528b08bdb25210104222ac79a656fa8d8723edd1cd015861619dbd0a99e5dc715b79

Score
8/10

Malware Config

Targets

    • Target

      3c479a19dc1022dcdcc35977ba3b8cdc27105227337c19f87116f9c4d5cfdada

    • Size

      1.8MB

    • MD5

      a5d67c582e7f243ea729a30bacde5485

    • SHA1

      eb2e496e266892974b410f67b0e522bcd1c3fc01

    • SHA256

      3c479a19dc1022dcdcc35977ba3b8cdc27105227337c19f87116f9c4d5cfdada

    • SHA512

      a79b16766909126dbfa7b2490352016094be7021d2deb58bd58fc08e957f528b08bdb25210104222ac79a656fa8d8723edd1cd015861619dbd0a99e5dc715b79

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks