General

  • Target

    cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837

  • Size

    47KB

  • Sample

    211207-q2rxeahgem

  • MD5

    aa0b8e24edeca2b1e3a0e6c9961af43b

  • SHA1

    c17a74e43ff4bc489d0f396cc56a2d3eaee36ea9

  • SHA256

    cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837

  • SHA512

    35ed920b3e6e46468b034894424e97deadad44c2c7ae12361183912cf51a4cfa3866980edefe1e0c44c1748106bf974f243512bc3a8445f34816f871abf50cee

Score
10/10
upx

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://haohm.502ok.com/hm

Targets

    • Target

      cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837

    • Size

      47KB

    • MD5

      aa0b8e24edeca2b1e3a0e6c9961af43b

    • SHA1

      c17a74e43ff4bc489d0f396cc56a2d3eaee36ea9

    • SHA256

      cb3d42cb0a374cded8d38f8403df22170689a5e196c98186d10495e60a798837

    • SHA512

      35ed920b3e6e46468b034894424e97deadad44c2c7ae12361183912cf51a4cfa3866980edefe1e0c44c1748106bf974f243512bc3a8445f34816f871abf50cee

    Score
    10/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks