General

  • Target

    575504ded880aeae3504b78b2b8fae77ad544716bb25ad68313b7558207a2631

  • Size

    381KB

  • Sample

    220724-3cyd4sdaer

  • MD5

    4fb7b70688137c1ab6631c2c88fef868

  • SHA1

    a8bfcad1e8654c661496811c2053b2617daf898a

  • SHA256

    575504ded880aeae3504b78b2b8fae77ad544716bb25ad68313b7558207a2631

  • SHA512

    3b3e52e8334768c3785a9bae638d9bc860242bdcd406103d7ff48b166c4c4e3d28fdb14c0f24cdce071e66d3b6638c6a345d0d893734e16f4bd91fc73f940725

Score
10/10

Malware Config

Targets

    • Target

      575504ded880aeae3504b78b2b8fae77ad544716bb25ad68313b7558207a2631

    • Size

      381KB

    • MD5

      4fb7b70688137c1ab6631c2c88fef868

    • SHA1

      a8bfcad1e8654c661496811c2053b2617daf898a

    • SHA256

      575504ded880aeae3504b78b2b8fae77ad544716bb25ad68313b7558207a2631

    • SHA512

      3b3e52e8334768c3785a9bae638d9bc860242bdcd406103d7ff48b166c4c4e3d28fdb14c0f24cdce071e66d3b6638c6a345d0d893734e16f4bd91fc73f940725

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks