General

  • Target

    56d27bc5748ac0b744e25d5e973b7d656fcab436d07f2e64c479403795a3f7a6

  • Size

    254KB

  • Sample

    220725-bzsctsheej

  • MD5

    49fbfe053d65454ae4bc609a6ef14fc5

  • SHA1

    2999e2c3686fa32ce774c3f22d4deab2a592295c

  • SHA256

    56d27bc5748ac0b744e25d5e973b7d656fcab436d07f2e64c479403795a3f7a6

  • SHA512

    f79a14acca55e341a311770ae54b854ba4612e63006102d9134feed72d8654f02acbd9f79bb6516acc5747519d783e5c2e20fc923db9b2b8523a8aa1e922c844

Score
10/10

Malware Config

Targets

    • Target

      56d27bc5748ac0b744e25d5e973b7d656fcab436d07f2e64c479403795a3f7a6

    • Size

      254KB

    • MD5

      49fbfe053d65454ae4bc609a6ef14fc5

    • SHA1

      2999e2c3686fa32ce774c3f22d4deab2a592295c

    • SHA256

      56d27bc5748ac0b744e25d5e973b7d656fcab436d07f2e64c479403795a3f7a6

    • SHA512

      f79a14acca55e341a311770ae54b854ba4612e63006102d9134feed72d8654f02acbd9f79bb6516acc5747519d783e5c2e20fc923db9b2b8523a8aa1e922c844

    Score
    10/10
    • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

      suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks