General

  • Target

    38dae9e865a6bbb28e22811518968512a72dd5b7c08831814789d1780cfe53b5

  • Size

    70KB

  • Sample

    220625-xc1lkshhd4

  • MD5

    75f0f4d19fe170e19516d88c88dffbd4

  • SHA1

    362d48272e419197aed95ea907e08bd7849e4524

  • SHA256

    38dae9e865a6bbb28e22811518968512a72dd5b7c08831814789d1780cfe53b5

  • SHA512

    3dd8f209c6e344c5fb9bb651d7a6a16af7264fcf2698624fc0027260206040674b85246dceb44b804224194ed1000379cc32c8b0ce68f62ded18f68405249347

Score
10/10

Malware Config

Targets

    • Target

      38dae9e865a6bbb28e22811518968512a72dd5b7c08831814789d1780cfe53b5

    • Size

      70KB

    • MD5

      75f0f4d19fe170e19516d88c88dffbd4

    • SHA1

      362d48272e419197aed95ea907e08bd7849e4524

    • SHA256

      38dae9e865a6bbb28e22811518968512a72dd5b7c08831814789d1780cfe53b5

    • SHA512

      3dd8f209c6e344c5fb9bb651d7a6a16af7264fcf2698624fc0027260206040674b85246dceb44b804224194ed1000379cc32c8b0ce68f62ded18f68405249347

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks