General

  • Target

    5363962b9ef23677c82ce5294f42c622a941d238180ffcde9fb6f1cee9571f08

  • Size

    898KB

  • Sample

    221123-xgdbvaeh94

  • MD5

    5c41de5cea0bc148b8177cb41803d7c9

  • SHA1

    47fbd7205613bd5f451439ccec5b514dbc4c7c0f

  • SHA256

    5363962b9ef23677c82ce5294f42c622a941d238180ffcde9fb6f1cee9571f08

  • SHA512

    b0d812109610e8754b3a52b370c37ea188099e2d5ae1ce2fdf5fca4b3a8ef62edb2af87634726bda971efc81704978faa6f52d181167f4f7f8707b334d8450cd

  • SSDEEP

    6144:E3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhDM6a1F9nBG:E3TdtLW5WIj1YSSdFxs1z4

Score
10/10

Malware Config

Targets

    • Target

      5363962b9ef23677c82ce5294f42c622a941d238180ffcde9fb6f1cee9571f08

    • Size

      898KB

    • MD5

      5c41de5cea0bc148b8177cb41803d7c9

    • SHA1

      47fbd7205613bd5f451439ccec5b514dbc4c7c0f

    • SHA256

      5363962b9ef23677c82ce5294f42c622a941d238180ffcde9fb6f1cee9571f08

    • SHA512

      b0d812109610e8754b3a52b370c37ea188099e2d5ae1ce2fdf5fca4b3a8ef62edb2af87634726bda971efc81704978faa6f52d181167f4f7f8707b334d8450cd

    • SSDEEP

      6144:E3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhDM6a1F9nBG:E3TdtLW5WIj1YSSdFxs1z4

    Score
    10/10
    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks