General

  • Target

    98c2a687400e6b106e9091c8f463888b178de7d5deceb1e5e6ed61e947cb5e67

  • Size

    2.8MB

  • Sample

    221123-2x7b3sba65

  • MD5

    702c8fa6395747b6ecad5afbaa503611

  • SHA1

    521eab0f958432e0f88aa75c9d4953ad8d926afd

  • SHA256

    98c2a687400e6b106e9091c8f463888b178de7d5deceb1e5e6ed61e947cb5e67

  • SHA512

    21b6bef8ddaf93e6fe16210e7b2da913ca4e7e1ac6c4a6c9a684e3b5c8d7f45b58c8e79274c58e701ab9d8ce1027de1b6a779a6e6206d93c445ec16bda813c71

  • SSDEEP

    49152:E9mdP0crDpSe4HhFDKkBnUvsF6Z9HPwCiUVrGgqpALwFpSt2kdgsGbnXTsqE:Om+crdSe4HhFDikM+C/VrGgqSLwm2jsV

Score
9/10

Malware Config

Targets

    • Target

      98c2a687400e6b106e9091c8f463888b178de7d5deceb1e5e6ed61e947cb5e67

    • Size

      2.8MB

    • MD5

      702c8fa6395747b6ecad5afbaa503611

    • SHA1

      521eab0f958432e0f88aa75c9d4953ad8d926afd

    • SHA256

      98c2a687400e6b106e9091c8f463888b178de7d5deceb1e5e6ed61e947cb5e67

    • SHA512

      21b6bef8ddaf93e6fe16210e7b2da913ca4e7e1ac6c4a6c9a684e3b5c8d7f45b58c8e79274c58e701ab9d8ce1027de1b6a779a6e6206d93c445ec16bda813c71

    • SSDEEP

      49152:E9mdP0crDpSe4HhFDKkBnUvsF6Z9HPwCiUVrGgqpALwFpSt2kdgsGbnXTsqE:Om+crdSe4HhFDikM+C/VrGgqSLwm2jsV

    Score
    9/10
    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks