General

  • Target

    Winlocker.VB6.Blacksod.zip

  • Size

    1.6MB

  • Sample

    230413-mggzxsag49

  • MD5

    713f3673049a096ea23787a9bcb63329

  • SHA1

    b6dad889f46dc19ae8a444b93b0a14248404c11d

  • SHA256

    a62c54fefde2762426208c6e6c7f01ef2066fc837f94f5f36d11a36b3ecddd5f

  • SHA512

    810bdf865a25bde85096e95c697ba7c1b79130b5e589c84ab93b21055b7341b5446d4e15905f7aa4cc242127d9ed1cf6f078b43fe452ad2e40695e5ab2bf8a18

  • SSDEEP

    49152:2OiR+zJsyziTwWQRtQWgpn8QbX1ncWFwUGVF6VpHk:2OVdzVW4tQWgp8QT1XFwUGKPk

Score
10/10

Malware Config

Targets

    • Target

    • Size

      2.4MB

    • MD5

      dbfbf254cfb84d991ac3860105d66fc6

    • SHA1

      893110d8c8451565caa591ddfccf92869f96c242

    • SHA256

      68b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c

    • SHA512

      5e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d

    • SSDEEP

      49152:6kAG2QGTC5xvMdgpdb1KRHGepUu2cGbqPs9+q2HRPTnFVSLE:6kAjQGTCnvMmpYQqPNRPTnF4Y

    Score
    10/10
    • Modifies WinLogon for persistence

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks