General

  • Target

    ff7d3b6003c9058e40ae38a6a7efe40c.exe

  • Size

    400KB

  • Sample

    210222-2gtrnk7r6x

  • MD5

    ff7d3b6003c9058e40ae38a6a7efe40c

  • SHA1

    842bbfb81f4a65112bc2d8e4aff8b976e5db9a55

  • SHA256

    c3304ec52968793ae709cf7c7caad6acae0bded8088f06cefbee55bde0a9224f

  • SHA512

    486865a075b6d87187ea73ae2e76a7537f8fd63a6743adfbfc4225573e98187de4c397771061e92442fb868ab48df8cde4b9e4ebba2ef6d065456c8a4049ee98

Score
8/10

Malware Config

Targets

    • Target

      ff7d3b6003c9058e40ae38a6a7efe40c.exe

    • Size

      400KB

    • MD5

      ff7d3b6003c9058e40ae38a6a7efe40c

    • SHA1

      842bbfb81f4a65112bc2d8e4aff8b976e5db9a55

    • SHA256

      c3304ec52968793ae709cf7c7caad6acae0bded8088f06cefbee55bde0a9224f

    • SHA512

      486865a075b6d87187ea73ae2e76a7537f8fd63a6743adfbfc4225573e98187de4c397771061e92442fb868ab48df8cde4b9e4ebba2ef6d065456c8a4049ee98

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets service image path in registry

    • Deletes itself

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks