General

  • Target

    RDPWInst-v1.6.2.msi

  • Size

    640KB

  • Sample

    240706-xffqkszdrk

  • MD5

    92cbbe2d06d03c156c83ae1a02ab30e3

  • SHA1

    7d14f457f193d75dd7f52becdee5cf25b948573b

  • SHA256

    9899ffecf141ab4535ec702facbf2b4233903b428b862f3a87e635d09c6244de

  • SHA512

    b7eafccee7ab76411209f20cf370de53b0c83fc700047b2de66b26e540a07797b8f7eb1513bcceaa4cee4c8c0b2382788a154003236980f125c281cc7479bb4a

  • SSDEEP

    12288:GnAYhZFoqIVAV0yjNZzucNNZLVk/dJJibRoQu9kzWEYCdrflYemcS1/U:UASZFKAVbBZzu0Ni49oQu9DuZYebSS

Malware Config

Targets

    • Target

      RDPWInst-v1.6.2.msi

    • Size

      640KB

    • MD5

      92cbbe2d06d03c156c83ae1a02ab30e3

    • SHA1

      7d14f457f193d75dd7f52becdee5cf25b948573b

    • SHA256

      9899ffecf141ab4535ec702facbf2b4233903b428b862f3a87e635d09c6244de

    • SHA512

      b7eafccee7ab76411209f20cf370de53b0c83fc700047b2de66b26e540a07797b8f7eb1513bcceaa4cee4c8c0b2382788a154003236980f125c281cc7479bb4a

    • SSDEEP

      12288:GnAYhZFoqIVAV0yjNZzucNNZLVk/dJJibRoQu9kzWEYCdrflYemcS1/U:UASZFKAVbBZzu0Ni49oQu9DuZYebSS

    • Server Software Component: Terminal Services DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Modifies Windows Firewall

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks