General

  • Target

    c09c6ebebf311bbe3ac421d286f419e2d0c3707229fa1d936793290f8eeb3a5b

  • Size

    69KB

  • Sample

    210302-sxqrlp6zge

  • MD5

    b2eeba64441b3b35e9df5c31ed9bb7ca

  • SHA1

    15b41d2281f8025827127f7e143e9918c0523f44

  • SHA256

    c09c6ebebf311bbe3ac421d286f419e2d0c3707229fa1d936793290f8eeb3a5b

  • SHA512

    ebdb8b649af8f660adf9016b9cdbf81d12f6a0b6db5c15480a43545d286b0223dc1c3445cb90e047ff839b2e872fbc750542d18fbb000894bd9e7a9a26796b40

Score
10/10

Malware Config

Targets

    • Target

      c09c6ebebf311bbe3ac421d286f419e2d0c3707229fa1d936793290f8eeb3a5b

    • Size

      69KB

    • MD5

      b2eeba64441b3b35e9df5c31ed9bb7ca

    • SHA1

      15b41d2281f8025827127f7e143e9918c0523f44

    • SHA256

      c09c6ebebf311bbe3ac421d286f419e2d0c3707229fa1d936793290f8eeb3a5b

    • SHA512

      ebdb8b649af8f660adf9016b9cdbf81d12f6a0b6db5c15480a43545d286b0223dc1c3445cb90e047ff839b2e872fbc750542d18fbb000894bd9e7a9a26796b40

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks