General

  • Target

    c80f44ee75aab44146e49da959e41b4ced5823d3bdbe58849cc4ba6023d6e078

  • Size

    1.8MB

  • Sample

    220707-lgg49adaf5

  • MD5

    4634b6d2a791aadb4a09ce70b1265753

  • SHA1

    bea32410f24f2fa1ac547d2f728b81f54442de18

  • SHA256

    c80f44ee75aab44146e49da959e41b4ced5823d3bdbe58849cc4ba6023d6e078

  • SHA512

    aace47c4134a29e4beb281606ec272be9eb6f8b85dc017e5e437d27f71cb21f663966335f5b45eb0c3e404acc19c342b8f86dc715bd0ad6647b2a78f80c6291e

Score
8/10

Malware Config

Targets

    • Target

      c80f44ee75aab44146e49da959e41b4ced5823d3bdbe58849cc4ba6023d6e078

    • Size

      1.8MB

    • MD5

      4634b6d2a791aadb4a09ce70b1265753

    • SHA1

      bea32410f24f2fa1ac547d2f728b81f54442de18

    • SHA256

      c80f44ee75aab44146e49da959e41b4ced5823d3bdbe58849cc4ba6023d6e078

    • SHA512

      aace47c4134a29e4beb281606ec272be9eb6f8b85dc017e5e437d27f71cb21f663966335f5b45eb0c3e404acc19c342b8f86dc715bd0ad6647b2a78f80c6291e

    Score
    6/10
    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks