General

  • Target

    53dfcaa40638683ee5c04f95673274ba

  • Size

    791KB

  • Sample

    240111-sra71sacep

  • MD5

    53dfcaa40638683ee5c04f95673274ba

  • SHA1

    84dc1f5df8f719660ab016e30f13cfd1fb9e51ca

  • SHA256

    39cb4858c187bac6fa4e874ca525328a84ad6ebef099dd0255c78da51fd65bbd

  • SHA512

    64ca0454086ae7e6afe89e14d8da17d2a4adb7d9bef88cd5460cb4b4062d55e9ab3f525b65659535e0ad8ee85a3befd745ff7a3e0baad060f8ce58d3707a16c2

  • SSDEEP

    6144:cpqoa8aLiC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcYYnCH:cpqiC/2OGAtkCP4cejGSOpRKPCnIi

Score
10/10

Malware Config

Targets

    • Target

      53dfcaa40638683ee5c04f95673274ba

    • Size

      791KB

    • MD5

      53dfcaa40638683ee5c04f95673274ba

    • SHA1

      84dc1f5df8f719660ab016e30f13cfd1fb9e51ca

    • SHA256

      39cb4858c187bac6fa4e874ca525328a84ad6ebef099dd0255c78da51fd65bbd

    • SHA512

      64ca0454086ae7e6afe89e14d8da17d2a4adb7d9bef88cd5460cb4b4062d55e9ab3f525b65659535e0ad8ee85a3befd745ff7a3e0baad060f8ce58d3707a16c2

    • SSDEEP

      6144:cpqoa8aLiC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcYYnCH:cpqiC/2OGAtkCP4cejGSOpRKPCnIi

    Score
    10/10
    • Modifies WinLogon for persistence

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks