General

  • Target

    3cea3fcb48885d3b020967c76f491da0

  • Size

    127KB

  • Sample

    231225-z1tt2seag6

  • MD5

    3cea3fcb48885d3b020967c76f491da0

  • SHA1

    fb4571972b43db91b964286b513be18d4b8b383e

  • SHA256

    c6fdea4d7b126d58a2e6e7aa52185a59fc4ca1120c103de0400f48caa87b1fa5

  • SHA512

    aa5c00c2c5511d816084af1515347dee5147cb1dddc02d12267069fc364dc6f9f7417064f694c6d430005830ec05d66a99e455113213d5bb6d94c66338d1a1ac

  • SSDEEP

    3072:4pDBAKMk0gAN4lgOjCFQ2nf6bdtUNhomcNXR:4fMPgwIyNSb/YhobR

Score
7/10

Malware Config

Targets

    • Target

      3cea3fcb48885d3b020967c76f491da0

    • Size

      127KB

    • MD5

      3cea3fcb48885d3b020967c76f491da0

    • SHA1

      fb4571972b43db91b964286b513be18d4b8b383e

    • SHA256

      c6fdea4d7b126d58a2e6e7aa52185a59fc4ca1120c103de0400f48caa87b1fa5

    • SHA512

      aa5c00c2c5511d816084af1515347dee5147cb1dddc02d12267069fc364dc6f9f7417064f694c6d430005830ec05d66a99e455113213d5bb6d94c66338d1a1ac

    • SSDEEP

      3072:4pDBAKMk0gAN4lgOjCFQ2nf6bdtUNhomcNXR:4fMPgwIyNSb/YhobR

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks