General

  • Target

    617c0f2c8c7e535c40861a4b343eb3c6d98e63cfa86cff18d9cc5d9fdc16c47c

  • Size

    25KB

  • Sample

    221029-aypd4secep

  • MD5

    0ac5c0eeb0707500c893707bf97600d0

  • SHA1

    414da0902b639ab58cc5224a1ba9b0309370383e

  • SHA256

    617c0f2c8c7e535c40861a4b343eb3c6d98e63cfa86cff18d9cc5d9fdc16c47c

  • SHA512

    ff461508896ab807e35eeb9e866a731449ffc323d24026614bb20b5e02f122f8034ed8d9d1adae31012fbccfbedb6cff35e9c694afb7c654859539e962e6847f

  • SSDEEP

    384:GF2wPg5s4yAczZ9DbotZIF9gav9rZsC0bxyOM+V6jsG2W67USp+:TwPFlrtboXIdvn0bsOM+cjsGw7Ug

Score
8/10

Malware Config

Targets

    • Target

      617c0f2c8c7e535c40861a4b343eb3c6d98e63cfa86cff18d9cc5d9fdc16c47c

    • Size

      25KB

    • MD5

      0ac5c0eeb0707500c893707bf97600d0

    • SHA1

      414da0902b639ab58cc5224a1ba9b0309370383e

    • SHA256

      617c0f2c8c7e535c40861a4b343eb3c6d98e63cfa86cff18d9cc5d9fdc16c47c

    • SHA512

      ff461508896ab807e35eeb9e866a731449ffc323d24026614bb20b5e02f122f8034ed8d9d1adae31012fbccfbedb6cff35e9c694afb7c654859539e962e6847f

    • SSDEEP

      384:GF2wPg5s4yAczZ9DbotZIF9gav9rZsC0bxyOM+V6jsG2W67USp+:TwPFlrtboXIdvn0bsOM+cjsGw7Ug

    Score
    8/10
    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks