General

  • Target

    okrakz.exe

  • Size

    97KB

  • Sample

    210302-v37m8c18g2

  • MD5

    d835f0d067f0ce5e5738ef3011e364ad

  • SHA1

    4c12e7082be38199b8e2963620fa6c47c2cb5386

  • SHA256

    93c94b311af623c1ce2930904c94cae88bddd481c9b95f5b59836f5c537b3948

  • SHA512

    e795778c202b80a6cb61e3f80e8be4a12b6a24d676707325e24fe7b48dc518f49f76e9d103420a8c55df16929478728665e186e829b732a226a4b51036195624

Score
8/10

Malware Config

Targets

    • Target

      okrakz.exe

    • Size

      97KB

    • MD5

      d835f0d067f0ce5e5738ef3011e364ad

    • SHA1

      4c12e7082be38199b8e2963620fa6c47c2cb5386

    • SHA256

      93c94b311af623c1ce2930904c94cae88bddd481c9b95f5b59836f5c537b3948

    • SHA512

      e795778c202b80a6cb61e3f80e8be4a12b6a24d676707325e24fe7b48dc518f49f76e9d103420a8c55df16929478728665e186e829b732a226a4b51036195624

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks