General

  • Target

    e4eafc386d396a7b8e2bdefb5697b444eae246e27495ba56abf006e20cec9d18

  • Size

    313KB

  • Sample

    221123-h14wkseg37

  • MD5

    070d6b1261915fb0799043cb16f3571f

  • SHA1

    87daecdf64a4c9c78578b5998a4441a9b49b5e0d

  • SHA256

    e4eafc386d396a7b8e2bdefb5697b444eae246e27495ba56abf006e20cec9d18

  • SHA512

    fdfe2786f2d6a3720088bcfb8cf49b5468f7ff7cd9074f1127e06dee3bd401dba28a8bb932782915420693bed72040f09a77d4edf9b7a3be741ea898c77a3e88

  • SSDEEP

    6144:nrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LV:nryu6/eIo4vMResyEf0uP9d9UG0V

Score
7/10

Malware Config

Targets

    • Target

      e4eafc386d396a7b8e2bdefb5697b444eae246e27495ba56abf006e20cec9d18

    • Size

      313KB

    • MD5

      070d6b1261915fb0799043cb16f3571f

    • SHA1

      87daecdf64a4c9c78578b5998a4441a9b49b5e0d

    • SHA256

      e4eafc386d396a7b8e2bdefb5697b444eae246e27495ba56abf006e20cec9d18

    • SHA512

      fdfe2786f2d6a3720088bcfb8cf49b5468f7ff7cd9074f1127e06dee3bd401dba28a8bb932782915420693bed72040f09a77d4edf9b7a3be741ea898c77a3e88

    • SSDEEP

      6144:nrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LV:nryu6/eIo4vMResyEf0uP9d9UG0V

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks