General

  • Target

    05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581

  • Size

    382KB

  • Sample

    220213-pp1s4shgh5

  • MD5

    a49c0e0d1ca8a829a8175a3931e5cba1

  • SHA1

    efa1b8275c6b1b1b7a5a21ecab8aec9f0fbea6f1

  • SHA256

    05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581

  • SHA512

    50e036a03741c8465d38b66d3d27741f2f1f580cd0c54daeac254b2ada3b1d3d21310f9a522f2606e01943401d7756ac976e95e8b444712008109ccc756a80b2

Score
10/10

Malware Config

Targets

    • Target

      05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581

    • Size

      382KB

    • MD5

      a49c0e0d1ca8a829a8175a3931e5cba1

    • SHA1

      efa1b8275c6b1b1b7a5a21ecab8aec9f0fbea6f1

    • SHA256

      05036d5462ca70ebd709ba9218f07ff16a8d5cfa33dbf19b8407fff404df9581

    • SHA512

      50e036a03741c8465d38b66d3d27741f2f1f580cd0c54daeac254b2ada3b1d3d21310f9a522f2606e01943401d7756ac976e95e8b444712008109ccc756a80b2

    Score
    8/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks