General

  • Target

    5625d0606494bd36c218e8f9b765be4361cd016579223601f01c47b344121786

  • Size

    151KB

  • Sample

    221123-w7zgbshb4v

  • MD5

    527b41724c475022594d6c4103127e20

  • SHA1

    b45c675b2d0027515a78e7a3f1a6387b6a24bd14

  • SHA256

    5625d0606494bd36c218e8f9b765be4361cd016579223601f01c47b344121786

  • SHA512

    21b56cf01a3cccc1320536ecdfb863e99f3f65f9808ac3da84f825e8a9dc5e56ef556dbcf075c22ddc7254a86e40696f6a7c063a32d96ff9201a8a121e07eeef

  • SSDEEP

    3072:PbKT6Y6qnPLs9JZBKh4Qu9kW7M/tI7wZdCQ04:Te6qoJjKh4d9CGQ04

Score
10/10

Malware Config

Targets

    • Target

      5625d0606494bd36c218e8f9b765be4361cd016579223601f01c47b344121786

    • Size

      151KB

    • MD5

      527b41724c475022594d6c4103127e20

    • SHA1

      b45c675b2d0027515a78e7a3f1a6387b6a24bd14

    • SHA256

      5625d0606494bd36c218e8f9b765be4361cd016579223601f01c47b344121786

    • SHA512

      21b56cf01a3cccc1320536ecdfb863e99f3f65f9808ac3da84f825e8a9dc5e56ef556dbcf075c22ddc7254a86e40696f6a7c063a32d96ff9201a8a121e07eeef

    • SSDEEP

      3072:PbKT6Y6qnPLs9JZBKh4Qu9kW7M/tI7wZdCQ04:Te6qoJjKh4d9CGQ04

    Score
    10/10
    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks