General

  • Target

    NFT-Dali2.zip

  • Size

    32.7MB

  • Sample

    220419-jfqnwsacgl

  • MD5

    39d4ce1a4a89074096b4c18b60c11c2f

  • SHA1

    f381ec9a830cef6e2f700e0d345d3b3d0d188f46

  • SHA256

    2b8a0655984a8d3fa1c3a6d2a5a30249218773f2abe329f1b6c56fa1ac58ef41

  • SHA512

    9a28cf322696ef185ebc62672ac6c5d1b28103f49402d9be0ae42945c8532603b387889eb699322b58929d21fa32f8fe30d53652c6cf18cbed46a2c2946f61cf

Score
8/10

Malware Config

Targets

    • Target

      NFT-Dali/NFT_Dali_Configurator/Manual_masterConfigurator_de.pdf

    • Size

      9.6MB

    • MD5

      b3262386ef22e61f76e05098a7bb0a45

    • SHA1

      4af376b09f0f51ce29af87e0d9bc54093d041e66

    • SHA256

      2924a4690cc94bde85b4e4eb7b3c1240a20f71089e7468079259326e2a0a39e3

    • SHA512

      0fe494f0bbd798e7ac89adff7da7fe0d7026d74c2a3ce57c9aa0804e3ad8fe25c50eb370492a3181ca0896fb5d31c33ec57c73d42e8d7a1ec6514ffeadaeaaf1

    Score
    1/10
    • Target

      masterCONFIGURATOR_v2.16.0.1407/Release_Note_masterCONFIGURATOR V2.16.0.1407.pdf

    • Size

      172KB

    • MD5

      06bed4aafb76643794f4006506b46ea8

    • SHA1

      190c76f62b8308102c0d01e1671fb9984998a190

    • SHA256

      bab2c72d3a27165677bdf7ee45baa5055d2c046a60514113f312f055e895bcc7

    • SHA512

      bbb563ec2f64a940997589aec7ccda1d298ec74d2cc075ab9372d111ac6fbf59d19867f2e5f1bedea3d9cf19351212d252611f531e4f46e60f9795dc24ea750e

    Score
    1/10
    • Target

      masterCONFIGURATOR_v2.16.0.1407/masterCONFIGURATOR_v2.16.0.1407.exe

    • Size

      24.8MB

    • MD5

      c68242aef3fcb3c3026558da41a81e9f

    • SHA1

      a75f12a5478017257a2efc19255b083d665f3253

    • SHA256

      2d0317b2fd26072119aa48686918f6314c730af415074633dc54e3df57db38aa

    • SHA512

      f1a10f16b5845eb107a80e60cdc81d67e4f6f6440c66ac1b767b1a7eb1eef720e16be8b5a0e2ce634de52898caf0d3d3f0d285dc0b32f84b5cc38a68ab8749f0

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks