General

  • Target

    3f9bf32d4248e01acb1914645dca5cb863fffd6d2649ba5fde3b46064183dbd6

  • Size

    70KB

  • Sample

    220630-31e8fadbfq

  • MD5

    bd8c603bfd3a71bd207af479ca431ff8

  • SHA1

    a614bb89daa11ad79ac2363302ad09179576a328

  • SHA256

    3f9bf32d4248e01acb1914645dca5cb863fffd6d2649ba5fde3b46064183dbd6

  • SHA512

    932e44ae592beb667232988725f0486b42cf42900d10de64bdc3226b52f8ce344cddd303ca3a47bea64ec49f688c8aa25d2b82d25df37343d2b8c721be76457f

Score
10/10

Malware Config

Targets

    • Target

      3f9bf32d4248e01acb1914645dca5cb863fffd6d2649ba5fde3b46064183dbd6

    • Size

      70KB

    • MD5

      bd8c603bfd3a71bd207af479ca431ff8

    • SHA1

      a614bb89daa11ad79ac2363302ad09179576a328

    • SHA256

      3f9bf32d4248e01acb1914645dca5cb863fffd6d2649ba5fde3b46064183dbd6

    • SHA512

      932e44ae592beb667232988725f0486b42cf42900d10de64bdc3226b52f8ce344cddd303ca3a47bea64ec49f688c8aa25d2b82d25df37343d2b8c721be76457f

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks