General

  • Target

    3bf14cfd75d9bc2745fe0ac35fb1edf1a598cea0c2dca19e7ed02cf8000f1bd2

  • Size

    4.5MB

  • Sample

    220703-k3r1xafce7

  • MD5

    72eff6024f5f132855cd5d52cbcaa7a1

  • SHA1

    476682759bb36839ede390587e84623bff79ff32

  • SHA256

    3bf14cfd75d9bc2745fe0ac35fb1edf1a598cea0c2dca19e7ed02cf8000f1bd2

  • SHA512

    8aa24726910b302b3c0693493a6ebee3954d432ba02b27aca64fbcfbdb36ec3bbba525b492a0696d54e61f25ff4e89ae8ef47757d5d8e482c1c87004e7b89777

Score
8/10

Malware Config

Targets

    • Target

      3bf14cfd75d9bc2745fe0ac35fb1edf1a598cea0c2dca19e7ed02cf8000f1bd2

    • Size

      4.5MB

    • MD5

      72eff6024f5f132855cd5d52cbcaa7a1

    • SHA1

      476682759bb36839ede390587e84623bff79ff32

    • SHA256

      3bf14cfd75d9bc2745fe0ac35fb1edf1a598cea0c2dca19e7ed02cf8000f1bd2

    • SHA512

      8aa24726910b302b3c0693493a6ebee3954d432ba02b27aca64fbcfbdb36ec3bbba525b492a0696d54e61f25ff4e89ae8ef47757d5d8e482c1c87004e7b89777

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks