General

  • Target

    2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c

  • Size

    1.2MB

  • Sample

    220130-h99s7ahef2

  • MD5

    003b5373a5c5a4bdcef827a6ad335cc7

  • SHA1

    2f535266344cc774d506fa517aab97d74d0ea76a

  • SHA256

    2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c

  • SHA512

    ef3df7d2a5a9b8b2145e77ead4edb27db07d092d886f2ac3d94546974a96751f34fb940d4b1d88ccec4a443dbb4c3d5dd3ce4be68bb0394a16eb260fa4f91ab8

Score
10/10

Malware Config

Extracted

Family

rustybuer

C2

https://cerionetya.com/

Targets

    • Target

      2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c

    • Size

      1.2MB

    • MD5

      003b5373a5c5a4bdcef827a6ad335cc7

    • SHA1

      2f535266344cc774d506fa517aab97d74d0ea76a

    • SHA256

      2b093ef5eef05f81d6b69c61951091a399ccf6dbc42df822c40f35146a04523c

    • SHA512

      ef3df7d2a5a9b8b2145e77ead4edb27db07d092d886f2ac3d94546974a96751f34fb940d4b1d88ccec4a443dbb4c3d5dd3ce4be68bb0394a16eb260fa4f91ab8

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks