General

  • Target

    file

  • Size

    81KB

  • Sample

    210122-xzg3p7ja72

  • MD5

    dd733ee22089eb90bc22d67f153b5fc7

  • SHA1

    7e5205c24030350e5a7609616fc3259126f5b0a6

  • SHA256

    52b73dfbe12fa8408c9d9df2b56d8053c393efd8ddd82016606217748fc396e3

  • SHA512

    29fc48706cda11344ebea19af761711f844d5ed7acdf2953fe678b139ab68cbff678315dc588d9aedabc13ab24456b983dc36da086de10cf739dd30d994f93bf

Score
8/10

Malware Config

Targets

    • Target

      file

    • Size

      81KB

    • MD5

      dd733ee22089eb90bc22d67f153b5fc7

    • SHA1

      7e5205c24030350e5a7609616fc3259126f5b0a6

    • SHA256

      52b73dfbe12fa8408c9d9df2b56d8053c393efd8ddd82016606217748fc396e3

    • SHA512

      29fc48706cda11344ebea19af761711f844d5ed7acdf2953fe678b139ab68cbff678315dc588d9aedabc13ab24456b983dc36da086de10cf739dd30d994f93bf

    Score
    5/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks