General

  • Target

    45d9883c9567fb3f5f2fc433f24b1428e51e431c66df53a230f6e2a63bd891dc

  • Size

    850KB

  • Sample

    220707-mplm3sdddk

  • MD5

    60fa79ac812a9c3d4c357a21fe42bb5f

  • SHA1

    f0656de949d462d2ff5c2b809574c01bf3bc8da3

  • SHA256

    45d9883c9567fb3f5f2fc433f24b1428e51e431c66df53a230f6e2a63bd891dc

  • SHA512

    6bf22352f1b3dfb1958fb655826bc0a4199cfd7b7d898759ea2c7067767313782231b7f8aaabe2d05557e635c4afb6c3e1ebca94785f0f03e65f49b647f5e395

Score
10/10

Malware Config

Targets

    • Target

      45d9883c9567fb3f5f2fc433f24b1428e51e431c66df53a230f6e2a63bd891dc

    • Size

      850KB

    • MD5

      60fa79ac812a9c3d4c357a21fe42bb5f

    • SHA1

      f0656de949d462d2ff5c2b809574c01bf3bc8da3

    • SHA256

      45d9883c9567fb3f5f2fc433f24b1428e51e431c66df53a230f6e2a63bd891dc

    • SHA512

      6bf22352f1b3dfb1958fb655826bc0a4199cfd7b7d898759ea2c7067767313782231b7f8aaabe2d05557e635c4afb6c3e1ebca94785f0f03e65f49b647f5e395

    Score
    10/10
    • Modifies WinLogon for persistence

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks