General

  • Target

    8f42770f40b34525ff0a5f04d3e96c33

  • Size

    3.8MB

  • Sample

    201117-651r6tkz8e

  • MD5

    356d9188efc71fc4f5adfbb0174f74c1

  • SHA1

    c417aea92561d3dd1a07eb85f23b6de36027fc8a

  • SHA256

    b7ef5f76cb5998d3d697d7ec3e3f4277d95f0c30be2741464b0d5015935402c2

  • SHA512

    5de02f0eaa06f7dc47b5f0e64491fa70e48614ae8d197b84e1d28e512bca8ec79cc3696c4ecb1a73711d4ef621591b3d75c32ff71bbee814b7f0a72011b18f0f

Score
8/10

Malware Config

Targets

    • Target

      8f42770f40b34525ff0a5f04d3e96c33

    • Size

      3.8MB

    • MD5

      356d9188efc71fc4f5adfbb0174f74c1

    • SHA1

      c417aea92561d3dd1a07eb85f23b6de36027fc8a

    • SHA256

      b7ef5f76cb5998d3d697d7ec3e3f4277d95f0c30be2741464b0d5015935402c2

    • SHA512

      5de02f0eaa06f7dc47b5f0e64491fa70e48614ae8d197b84e1d28e512bca8ec79cc3696c4ecb1a73711d4ef621591b3d75c32ff71bbee814b7f0a72011b18f0f

    Score
    6/10
    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks