General

  • Target

    cd320ebe105ff09bc3a5fbff8da06a0a8fb1535b1f732e5c90f70c55856d7d30

  • Size

    302KB

  • Sample

    240420-df1wzafe5x

  • MD5

    4074ecd5a34121567659e1b0d679045f

  • SHA1

    596ef8e383482884c3bdf36d41828334058adf87

  • SHA256

    cd320ebe105ff09bc3a5fbff8da06a0a8fb1535b1f732e5c90f70c55856d7d30

  • SHA512

    b9f7345ceeefb7d64a8889df31a034314ac81802d15af2995871f70427c01c5b7c7faaf028c9b555b4eda4f1fe1f7f29a306c7193b9d5efd93e6a8248bc1ba71

  • SSDEEP

    6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY9:v6Wq4aaE6KwyF5L0Y2D1PqL+

Score
10/10

Malware Config

Targets

    • Target

      cd320ebe105ff09bc3a5fbff8da06a0a8fb1535b1f732e5c90f70c55856d7d30

    • Size

      302KB

    • MD5

      4074ecd5a34121567659e1b0d679045f

    • SHA1

      596ef8e383482884c3bdf36d41828334058adf87

    • SHA256

      cd320ebe105ff09bc3a5fbff8da06a0a8fb1535b1f732e5c90f70c55856d7d30

    • SHA512

      b9f7345ceeefb7d64a8889df31a034314ac81802d15af2995871f70427c01c5b7c7faaf028c9b555b4eda4f1fe1f7f29a306c7193b9d5efd93e6a8248bc1ba71

    • SSDEEP

      6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY9:v6Wq4aaE6KwyF5L0Y2D1PqL+

    Score
    10/10
    • Modifies visibility of file extensions in Explorer

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks