General

  • Target

    5786ceffb0027a210378157e1020354221d46a4560005113f53f1d4dd999e539

  • Size

    375KB

  • Sample

    220724-1r6ypaaacn

  • MD5

    45b556b6349bbd00cf2c0cbb98eceb25

  • SHA1

    2e5334a3d979177c258b3a7b248ff5cd8621cdc2

  • SHA256

    5786ceffb0027a210378157e1020354221d46a4560005113f53f1d4dd999e539

  • SHA512

    9d3bbda802bd48f080c3a05008b5ac7b573cd427af1d18da7858ac7848c9671f7cca6ebfdae4db00ac067fbefa6ab3c0f55e6463079e22c8b85f526a11aaf5c0

Score
10/10

Malware Config

Targets

    • Target

      5786ceffb0027a210378157e1020354221d46a4560005113f53f1d4dd999e539

    • Size

      375KB

    • MD5

      45b556b6349bbd00cf2c0cbb98eceb25

    • SHA1

      2e5334a3d979177c258b3a7b248ff5cd8621cdc2

    • SHA256

      5786ceffb0027a210378157e1020354221d46a4560005113f53f1d4dd999e539

    • SHA512

      9d3bbda802bd48f080c3a05008b5ac7b573cd427af1d18da7858ac7848c9671f7cca6ebfdae4db00ac067fbefa6ab3c0f55e6463079e22c8b85f526a11aaf5c0

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks