General

  • Target

    3c21287b4080837b949a3f7ffb031d8ed3556089700b89811c9e7dbefa81b5e5

  • Size

    1.2MB

  • Sample

    221125-2kcxpsfa6y

  • MD5

    8bfb1935c56b66fdf3b685c5b4954d81

  • SHA1

    5950c2ebb470a5b98e1017c476bdc9420855f690

  • SHA256

    3c21287b4080837b949a3f7ffb031d8ed3556089700b89811c9e7dbefa81b5e5

  • SHA512

    dd695892e577d1d5a404ff840670945a60dff06921bfce48f6d7ab04cf09d4ece094aee4e13442bdd3ae00adb22fdc906dbc5a08e182fc33df343279e3e031c8

  • SSDEEP

    24576:eJeJfAqkjp98zHpieTXpa8YHDsj1YEcycJ9nPx/I:UeJfAJGpLrpajHDe1PcrnP6

Score
10/10

Malware Config

Targets

    • Target

      3c21287b4080837b949a3f7ffb031d8ed3556089700b89811c9e7dbefa81b5e5

    • Size

      1.2MB

    • MD5

      8bfb1935c56b66fdf3b685c5b4954d81

    • SHA1

      5950c2ebb470a5b98e1017c476bdc9420855f690

    • SHA256

      3c21287b4080837b949a3f7ffb031d8ed3556089700b89811c9e7dbefa81b5e5

    • SHA512

      dd695892e577d1d5a404ff840670945a60dff06921bfce48f6d7ab04cf09d4ece094aee4e13442bdd3ae00adb22fdc906dbc5a08e182fc33df343279e3e031c8

    • SSDEEP

      24576:eJeJfAqkjp98zHpieTXpa8YHDsj1YEcycJ9nPx/I:UeJfAJGpLrpajHDe1PcrnP6

    Score
    10/10
    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks