General

  • Target

    512dcdde20ea7d71a0fcb599b0ba603d

  • Size

    12.5MB

  • Sample

    201117-k2nzr4qben

  • MD5

    67424ac60a8cebcee28124b353bb49cb

  • SHA1

    67eec0b4efdb102f12a57f3347876f8db91271a8

  • SHA256

    e5736a3647f36c366a1515c19d1ebc6b9d5d9a053f5cd467c7a80b13d83143f7

  • SHA512

    ce3ee51d762f1de4916274940ff4d60b075a29279e04d688bf39b2f07200c2107568f449a3640ed8fa15682b30817ad6e2b2d116882c88b6aaed2fe12fe31c10

Score
9/10

Malware Config

Targets

    • Target

      512dcdde20ea7d71a0fcb599b0ba603d

    • Size

      12.5MB

    • MD5

      67424ac60a8cebcee28124b353bb49cb

    • SHA1

      67eec0b4efdb102f12a57f3347876f8db91271a8

    • SHA256

      e5736a3647f36c366a1515c19d1ebc6b9d5d9a053f5cd467c7a80b13d83143f7

    • SHA512

      ce3ee51d762f1de4916274940ff4d60b075a29279e04d688bf39b2f07200c2107568f449a3640ed8fa15682b30817ad6e2b2d116882c88b6aaed2fe12fe31c10

    Score
    9/10
    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Tasks