General

  • Target

    0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca

  • Size

    101KB

  • Sample

    221003-sl2g1scecq

  • MD5

    685e2885632a84615884d3a4313853c6

  • SHA1

    2387695b2092ba71dba7f153f8c4cc42bf3371e9

  • SHA256

    0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca

  • SHA512

    57354507281f97df80a3eec051e924338b89950eb6c680d626f0edbd5e52f74ae18152b479f6c373fdd173375f341ecc847646ed343cb0e03c05dc28b14429dd

  • SSDEEP

    3072:ScH24GCxnyB9rdrkr3k1p4cq/LNUnAkJ44eCa:V247xnyB9ZflBJgz

Malware Config

Targets

    • Target

      0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca

    • Size

      101KB

    • MD5

      685e2885632a84615884d3a4313853c6

    • SHA1

      2387695b2092ba71dba7f153f8c4cc42bf3371e9

    • SHA256

      0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca

    • SHA512

      57354507281f97df80a3eec051e924338b89950eb6c680d626f0edbd5e52f74ae18152b479f6c373fdd173375f341ecc847646ed343cb0e03c05dc28b14429dd

    • SSDEEP

      3072:ScH24GCxnyB9rdrkr3k1p4cq/LNUnAkJ44eCa:V247xnyB9ZflBJgz

    • Adds policy Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks