General

  • Target

    576057e17c481c99d5a88236617a3fc0ec562015d5825f872d42381fd03a6953

  • Size

    309KB

  • Sample

    220724-2z6hkaccdk

  • MD5

    7162b8f77b5ef72196a4b644a2f13913

  • SHA1

    7ecf15d5f1a031ac46d4f3fefc23ab4a6e72ed36

  • SHA256

    576057e17c481c99d5a88236617a3fc0ec562015d5825f872d42381fd03a6953

  • SHA512

    fe57fd1cac36f1d6e13c0334bec6a778e73ae786e6f54dc3099b1e34a0fe00255f7d78c887ad8ee9af50b0ae4a715523f960dd64b116c2f5185ef8b9b4c762d4

Score
10/10

Malware Config

Targets

    • Target

      576057e17c481c99d5a88236617a3fc0ec562015d5825f872d42381fd03a6953

    • Size

      309KB

    • MD5

      7162b8f77b5ef72196a4b644a2f13913

    • SHA1

      7ecf15d5f1a031ac46d4f3fefc23ab4a6e72ed36

    • SHA256

      576057e17c481c99d5a88236617a3fc0ec562015d5825f872d42381fd03a6953

    • SHA512

      fe57fd1cac36f1d6e13c0334bec6a778e73ae786e6f54dc3099b1e34a0fe00255f7d78c887ad8ee9af50b0ae4a715523f960dd64b116c2f5185ef8b9b4c762d4

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks