General

  • Target

    578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd

  • Size

    258KB

  • Sample

    220724-1wq32aabfm

  • MD5

    08ce4673e80622649980dc275df6ce7d

  • SHA1

    cf1183a4866855fe6d2f1195294c7c911cce07cd

  • SHA256

    578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd

  • SHA512

    a98a4002a9a976c986afe3ecd7450e29232c591c053269126a2a8cb469b0c06899aa12cea029f5cb814f65f4b823bd2badc4cdc2e81f419d752ccffd04acbdb1

Score
10/10

Malware Config

Targets

    • Target

      578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd

    • Size

      258KB

    • MD5

      08ce4673e80622649980dc275df6ce7d

    • SHA1

      cf1183a4866855fe6d2f1195294c7c911cce07cd

    • SHA256

      578237b139662a39a42fc1a56ea8a467aa5e8010ab1d06026590807fe9d41ecd

    • SHA512

      a98a4002a9a976c986afe3ecd7450e29232c591c053269126a2a8cb469b0c06899aa12cea029f5cb814f65f4b823bd2badc4cdc2e81f419d752ccffd04acbdb1

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks