General

  • Target

    f20292438bcd78712d9bbce09866b484250640f50893991ad199796cfe28e50d

  • Size

    728KB

  • Sample

    221107-1b7kaacfcp

  • MD5

    0fca26c5f674fe71e1ca22bc9b13b388

  • SHA1

    f3b3dddf61e9d68223a08878acfe0fcacdc8da75

  • SHA256

    f20292438bcd78712d9bbce09866b484250640f50893991ad199796cfe28e50d

  • SHA512

    021336a181429bd96bb304861d92a588035a6029cc18315599db5e431ea6e9690e2106d3a23e55bedd98aa967bea94c5ed4187de6645e218f073be6876de2dda

  • SSDEEP

    6144:wpqoa8aLyC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcAYnCa:wpqyC/2OGAtkCP4cejGSOpRK3CnIi6

Score
10/10

Malware Config

Targets

    • Target

      f20292438bcd78712d9bbce09866b484250640f50893991ad199796cfe28e50d

    • Size

      728KB

    • MD5

      0fca26c5f674fe71e1ca22bc9b13b388

    • SHA1

      f3b3dddf61e9d68223a08878acfe0fcacdc8da75

    • SHA256

      f20292438bcd78712d9bbce09866b484250640f50893991ad199796cfe28e50d

    • SHA512

      021336a181429bd96bb304861d92a588035a6029cc18315599db5e431ea6e9690e2106d3a23e55bedd98aa967bea94c5ed4187de6645e218f073be6876de2dda

    • SSDEEP

      6144:wpqoa8aLyC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcAYnCa:wpqyC/2OGAtkCP4cejGSOpRK3CnIi6

    Score
    10/10
    • Modifies WinLogon for persistence

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks