General

  • Target

    7766346155.zip

  • Size

    191KB

  • Sample

    220720-kwxmtadgd2

  • MD5

    47e17eb89148fac1b4bbbaff37577e5f

  • SHA1

    1566c09fb391f22ce79148edeab0476e71179b7f

  • SHA256

    5ffd6e81c8621c99f3b4da51567c5f2493d0ba6a75ab1c2071938aabc3349072

  • SHA512

    866644bd58c18c3158549dc886875ae3781e9dac38b204ae044248dc6bbf3729d865363b5ddd2a051b83a6c35abe581ac6f5c61a45ae6a9aff8a35b9cafbf880

Score
10/10

Malware Config

Targets

    • Target

      7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9

    • Size

      224KB

    • MD5

      6892679f8a4b438c582c9954e15acd19

    • SHA1

      546bae92165363acd3e0aaef964cc02ec2a2e67d

    • SHA256

      7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9

    • SHA512

      064ece5fe73a356d9078e13134288e144288bd9e9d8d06cdd72f3aaf4cc9d397b5443be67e2d07f78a282d875187a9679e19506ae580d84c9a44142da366f108

    Score
    10/10
    • Matanbuchus

      A loader sold as MaaS first seen in February 2021.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks