General

  • Target

    e4dc1f707f16e71d1b82fba0ff667a5f1f342735cdb3a715f12a792a18ed2a72

  • Size

    313KB

  • Sample

    221123-h161yaeg42

  • MD5

    0cd07a712d4436319dfd77ab26f72e09

  • SHA1

    fd7f16c41bbaf518ed8518664f162ef7e9850507

  • SHA256

    e4dc1f707f16e71d1b82fba0ff667a5f1f342735cdb3a715f12a792a18ed2a72

  • SHA512

    42a3db3e9589f32f54264b3f5dd317820637f1e7cdb839115b390abc80f77ede1a7ab0dd9880cc1f1b49e3ba3b9cb9ef64928a85183e9849b91138442e557913

  • SSDEEP

    6144:ErK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Lz:Eryu6/eIo4vMResyEf0uP9d9UG0z

Score
7/10

Malware Config

Targets

    • Target

      e4dc1f707f16e71d1b82fba0ff667a5f1f342735cdb3a715f12a792a18ed2a72

    • Size

      313KB

    • MD5

      0cd07a712d4436319dfd77ab26f72e09

    • SHA1

      fd7f16c41bbaf518ed8518664f162ef7e9850507

    • SHA256

      e4dc1f707f16e71d1b82fba0ff667a5f1f342735cdb3a715f12a792a18ed2a72

    • SHA512

      42a3db3e9589f32f54264b3f5dd317820637f1e7cdb839115b390abc80f77ede1a7ab0dd9880cc1f1b49e3ba3b9cb9ef64928a85183e9849b91138442e557913

    • SSDEEP

      6144:ErK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Lz:Eryu6/eIo4vMResyEf0uP9d9UG0z

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks