General

  • Target

    3b901e66da57b60a08c6229431840da639381fce293033f90000310416ebaf2d

  • Size

    759KB

  • Sample

    220703-tjhgssfhgr

  • MD5

    519ed675e778bc503f8dbbf9a8627dca

  • SHA1

    908fd2551bd3947cfb340a6d5a215828d063a85f

  • SHA256

    3b901e66da57b60a08c6229431840da639381fce293033f90000310416ebaf2d

  • SHA512

    309964b6671af4a49fd7a141bd9235913fe93d7ae6237dde913600f85a0ab4b827dd15bea850842d89e803cbc276416925ee37d5fbb09fa7d3f672b921248fed

Score
10/10

Malware Config

Targets

    • Target

      3b901e66da57b60a08c6229431840da639381fce293033f90000310416ebaf2d

    • Size

      759KB

    • MD5

      519ed675e778bc503f8dbbf9a8627dca

    • SHA1

      908fd2551bd3947cfb340a6d5a215828d063a85f

    • SHA256

      3b901e66da57b60a08c6229431840da639381fce293033f90000310416ebaf2d

    • SHA512

      309964b6671af4a49fd7a141bd9235913fe93d7ae6237dde913600f85a0ab4b827dd15bea850842d89e803cbc276416925ee37d5fbb09fa7d3f672b921248fed

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks