General

  • Target

    a6d90369d389bb04cf4619cd820b8210

  • Size

    830KB

  • Sample

    220131-cwwfraecg9

  • MD5

    a6d90369d389bb04cf4619cd820b8210

  • SHA1

    4481d1cdb623fd775cb342f27c44305018bbe746

  • SHA256

    0e6860a8ce361236ec4bff327266a53152fe642e30bc076cada2d8ec9c1fa3c1

  • SHA512

    e444232c1389ab346f5b0700dc31e672154f7c3384bcaa9b6c908085cb336b4044c63466a2d041921dadae217a21723e40e33b7ab1169a1dfe6b7f9f769f4d43

Score
8/10

Malware Config

Targets

    • Target

      a6d90369d389bb04cf4619cd820b8210

    • Size

      830KB

    • MD5

      a6d90369d389bb04cf4619cd820b8210

    • SHA1

      4481d1cdb623fd775cb342f27c44305018bbe746

    • SHA256

      0e6860a8ce361236ec4bff327266a53152fe642e30bc076cada2d8ec9c1fa3c1

    • SHA512

      e444232c1389ab346f5b0700dc31e672154f7c3384bcaa9b6c908085cb336b4044c63466a2d041921dadae217a21723e40e33b7ab1169a1dfe6b7f9f769f4d43

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks