General

  • Target

    572652508d1996ac71722c35e33346f7ea1659dd70272d5030d96078658bf1f8

  • Size

    229KB

  • Sample

    220725-aw277affcr

  • MD5

    6c9d0687342e21c74ce05ee7439b747b

  • SHA1

    706c97cc20be0a2a9d11a7f9001d63a33e6c6fe8

  • SHA256

    572652508d1996ac71722c35e33346f7ea1659dd70272d5030d96078658bf1f8

  • SHA512

    1d96c9ec0c5c49462bba203160ce4825c79fc6858ace242c169307792389f47286f53c5a554528e58f353873723daaf45058088f0b64ad141067fb22fcd5ad79

Score
10/10

Malware Config

Targets

    • Target

      572652508d1996ac71722c35e33346f7ea1659dd70272d5030d96078658bf1f8

    • Size

      229KB

    • MD5

      6c9d0687342e21c74ce05ee7439b747b

    • SHA1

      706c97cc20be0a2a9d11a7f9001d63a33e6c6fe8

    • SHA256

      572652508d1996ac71722c35e33346f7ea1659dd70272d5030d96078658bf1f8

    • SHA512

      1d96c9ec0c5c49462bba203160ce4825c79fc6858ace242c169307792389f47286f53c5a554528e58f353873723daaf45058088f0b64ad141067fb22fcd5ad79

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks