General

  • Target

    SP and XTREND Set up-2020.zip

  • Size

    302.8MB

  • Sample

    221004-h9jl1ahcf2

  • MD5

    ddf46a7b44c25890bbba7d5d95b3725f

  • SHA1

    da63d06c6df2f41710e49913c25332e7042774ae

  • SHA256

    e70332c6e09c6a968ebb552e7c778d3f06963e2fd9a2e6a46e2244a82429e781

  • SHA512

    c74bf7a63a9a3cb8068590728407a973e651299a7bcb501ab40b72af36b1d3357d0e91e8d1606bad204730ed15a3d8d60864e650d6ea46d7300dc83be81ffe77

  • SSDEEP

    6291456:qFafcwv2TWOGoadHQdWc8+dkt+aIkwcubgtToDMB:karWSmWcTkt+eTuMoDMB

Score
8/10

Malware Config

Targets

    • Target

      SP and XTREND Set up-2020.zip

    • Size

      302.8MB

    • MD5

      ddf46a7b44c25890bbba7d5d95b3725f

    • SHA1

      da63d06c6df2f41710e49913c25332e7042774ae

    • SHA256

      e70332c6e09c6a968ebb552e7c778d3f06963e2fd9a2e6a46e2244a82429e781

    • SHA512

      c74bf7a63a9a3cb8068590728407a973e651299a7bcb501ab40b72af36b1d3357d0e91e8d1606bad204730ed15a3d8d60864e650d6ea46d7300dc83be81ffe77

    • SSDEEP

      6291456:qFafcwv2TWOGoadHQdWc8+dkt+aIkwcubgtToDMB:karWSmWcTkt+eTuMoDMB

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks