General

  • Target

    62ff315c54df6cd3e21bbb3488d5606095c780eca8503d3b9e0176fbc60c6a7c

  • Size

    708KB

  • Sample

    250703-gpshqst1ct

  • MD5

    7bc89da6d8337bf79ed193a78640e061

  • SHA1

    119359be6bd1673db9cb960e46f09e6b46b24e17

  • SHA256

    62ff315c54df6cd3e21bbb3488d5606095c780eca8503d3b9e0176fbc60c6a7c

  • SHA512

    3e46faa2024060c9eb00835d7c4fc5f3b04df5c0b474b78099c994b396ca15bb4577575fcd73356a03ea9c3bf7213c7db355026d9cae97a40fcea8caab70b7a7

  • SSDEEP

    12288:Ip4pNfz3ymJnJ8QCFkxCaQTOlOM64uhP7UBzEZ+4UD1a:iEtl9mRda1QJUWZ+4l

Score
10/10

Malware Config

Targets

    • Target

      62ff315c54df6cd3e21bbb3488d5606095c780eca8503d3b9e0176fbc60c6a7c

    • Size

      708KB

    • MD5

      7bc89da6d8337bf79ed193a78640e061

    • SHA1

      119359be6bd1673db9cb960e46f09e6b46b24e17

    • SHA256

      62ff315c54df6cd3e21bbb3488d5606095c780eca8503d3b9e0176fbc60c6a7c

    • SHA512

      3e46faa2024060c9eb00835d7c4fc5f3b04df5c0b474b78099c994b396ca15bb4577575fcd73356a03ea9c3bf7213c7db355026d9cae97a40fcea8caab70b7a7

    • SSDEEP

      12288:Ip4pNfz3ymJnJ8QCFkxCaQTOlOM64uhP7UBzEZ+4UD1a:iEtl9mRda1QJUWZ+4l

    Score
    10/10
    • Modifies WinLogon for persistence

    • Drops startup file

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks