General

  • Target

    25ff3d3e577048928818576a1a977234077565d3c7882f6cb888b840413470d7

  • Size

    1.5MB

  • Sample

    201117-qf2ezybwxn

  • MD5

    92ed1732dde4877831e1b18a475712e1

  • SHA1

    5f3686d13904510f6761692d99135f6a0686a002

  • SHA256

    25ff3d3e577048928818576a1a977234077565d3c7882f6cb888b840413470d7

  • SHA512

    312bccd7eca5ea5af4914aeca7651627a757cdb13acaf586118a9f9b36081d3a0aff0921af228b7604be8fea83a219bba7822e33cc43753d7569592b0569b6f5

Score
7/10

Malware Config

Targets

    • Target

      25ff3d3e577048928818576a1a977234077565d3c7882f6cb888b840413470d7

    • Size

      1.5MB

    • MD5

      92ed1732dde4877831e1b18a475712e1

    • SHA1

      5f3686d13904510f6761692d99135f6a0686a002

    • SHA256

      25ff3d3e577048928818576a1a977234077565d3c7882f6cb888b840413470d7

    • SHA512

      312bccd7eca5ea5af4914aeca7651627a757cdb13acaf586118a9f9b36081d3a0aff0921af228b7604be8fea83a219bba7822e33cc43753d7569592b0569b6f5

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

5
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks