General

  • Target

    8ba546fa7e4a3ce952b5e9b36769508134201d9ddcbc30278be28b2070a85f09

  • Size

    188KB

  • Sample

    221030-1hfedacgar

  • MD5

    a1b088c94e0547871a04aa66016ac640

  • SHA1

    c8d73b6dde055f3952792560d166f2c8057a564f

  • SHA256

    8ba546fa7e4a3ce952b5e9b36769508134201d9ddcbc30278be28b2070a85f09

  • SHA512

    f92e8e75875f0c9b8c3755582fc23991af281d00b53b27039c6137d1c9bdb5d1e88be3a9d90ad7a26988a7122c7282ca6a32e056b0a8e38e4ebe45974ca86d7d

  • SSDEEP

    3072:5CLrp0cQ7QAINqPDHQncyvrYOgH84MbcQqw:cLO7QAISA13/5

Score
6/10

Malware Config

Targets

    • Target

      8ba546fa7e4a3ce952b5e9b36769508134201d9ddcbc30278be28b2070a85f09

    • Size

      188KB

    • MD5

      a1b088c94e0547871a04aa66016ac640

    • SHA1

      c8d73b6dde055f3952792560d166f2c8057a564f

    • SHA256

      8ba546fa7e4a3ce952b5e9b36769508134201d9ddcbc30278be28b2070a85f09

    • SHA512

      f92e8e75875f0c9b8c3755582fc23991af281d00b53b27039c6137d1c9bdb5d1e88be3a9d90ad7a26988a7122c7282ca6a32e056b0a8e38e4ebe45974ca86d7d

    • SSDEEP

      3072:5CLrp0cQ7QAINqPDHQncyvrYOgH84MbcQqw:cLO7QAISA13/5

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks