General

  • Target

    57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91

  • Size

    220KB

  • Sample

    220725-azb56sfgdj

  • MD5

    0c552162f60fb671faa7446a355e92e2

  • SHA1

    88d1a340c67069e6bed84851f779d43c3dea1e0a

  • SHA256

    57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91

  • SHA512

    ed47d0bd18c7a114e86944520a89b43df188c1319dae3795cb8aac97fe1d24d972a5d4a9e21bed6cfd88b78d90d58c0070b6628bbd008d325c9bd55345165ea9

Score
10/10

Malware Config

Targets

    • Target

      57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91

    • Size

      220KB

    • MD5

      0c552162f60fb671faa7446a355e92e2

    • SHA1

      88d1a340c67069e6bed84851f779d43c3dea1e0a

    • SHA256

      57215fa8e239871d5d01952988568b76ddbc946909ce7e206add82233c71ba91

    • SHA512

      ed47d0bd18c7a114e86944520a89b43df188c1319dae3795cb8aac97fe1d24d972a5d4a9e21bed6cfd88b78d90d58c0070b6628bbd008d325c9bd55345165ea9

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks