General

  • Target

    7ec37ea04d8a1646ff93604e9d091df3

  • Size

    3.6MB

  • Sample

    201117-4l7ldkwwv6

  • MD5

    b826ee5982aced36aca56fe2cab09ead

  • SHA1

    c9080373b1bae60ea502ead59bd2635a059e94f1

  • SHA256

    f80a1d7df26511782d20c0ca17291977ba0077c8a7a5e262f31a594d5af4d9c4

  • SHA512

    f44ddcfb6c9e65a6a898d6525f1ea108b874fdf20bdc1f6357c22aaad5d2b116f918f69b06a082a159e64d7764550726abd7b325598fc87f8ee5e2995ee90c76

Score
6/10

Malware Config

Targets

    • Target

      7ec37ea04d8a1646ff93604e9d091df3

    • Size

      3.6MB

    • MD5

      b826ee5982aced36aca56fe2cab09ead

    • SHA1

      c9080373b1bae60ea502ead59bd2635a059e94f1

    • SHA256

      f80a1d7df26511782d20c0ca17291977ba0077c8a7a5e262f31a594d5af4d9c4

    • SHA512

      f44ddcfb6c9e65a6a898d6525f1ea108b874fdf20bdc1f6357c22aaad5d2b116f918f69b06a082a159e64d7764550726abd7b325598fc87f8ee5e2995ee90c76

    Score
    6/10
    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks