General

  • Target

    59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4

  • Size

    384KB

  • Sample

    220213-ppsgqshgh3

  • MD5

    4a3d69c28c4742177d6238bc16486f0d

  • SHA1

    517b70828d6c203939315d219b28502578620c17

  • SHA256

    59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4

  • SHA512

    bce9777d4d0536f793d88a7a0266386740469d2fb20f8df9e3b7127c5aeb9fcec32c0c3ae2afc143a6c7cfc7cfd139a65a3a8c3870843a93566e1402ef3e0b31

Score
10/10

Malware Config

Targets

    • Target

      59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4

    • Size

      384KB

    • MD5

      4a3d69c28c4742177d6238bc16486f0d

    • SHA1

      517b70828d6c203939315d219b28502578620c17

    • SHA256

      59a7e7d08911df41b3db1c6ef0d515f1bce2cd49320944198ffea3cd51f3e1c4

    • SHA512

      bce9777d4d0536f793d88a7a0266386740469d2fb20f8df9e3b7127c5aeb9fcec32c0c3ae2afc143a6c7cfc7cfd139a65a3a8c3870843a93566e1402ef3e0b31

    Score
    8/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks