General

  • Target

    7ec2e4b4e8d8c339525379ae2dd49f38

  • Size

    3.7MB

  • Sample

    201117-wcapl44hx6

  • MD5

    d8217ae9b608cbeb9c9da5eb977961a6

  • SHA1

    167622f5c4cced3a6bd6e824331e97ffb10389a6

  • SHA256

    6f785c3e70d6ff330e829d415da2005982778111775904444e83b2a33b089b9d

  • SHA512

    53e4bb0dd9e470ba002d4f03250bbfdd0bfb6fc069b4c7b289a434772b1303831bab1d255770abf49fa9f4e69fb34043760b62f250474082ec94835050dbceb7

Score
8/10

Malware Config

Targets

    • Target

      7ec2e4b4e8d8c339525379ae2dd49f38

    • Size

      3.7MB

    • MD5

      d8217ae9b608cbeb9c9da5eb977961a6

    • SHA1

      167622f5c4cced3a6bd6e824331e97ffb10389a6

    • SHA256

      6f785c3e70d6ff330e829d415da2005982778111775904444e83b2a33b089b9d

    • SHA512

      53e4bb0dd9e470ba002d4f03250bbfdd0bfb6fc069b4c7b289a434772b1303831bab1d255770abf49fa9f4e69fb34043760b62f250474082ec94835050dbceb7

    Score
    6/10
    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks