General

  • Target

    e55a2fd8d73eba9c29f98a2a02511382d12a01bd54d5d2ccff26a3746561a9df

  • Size

    316KB

  • Sample

    221123-h1vmxaeg27

  • MD5

    e66314317049a0e3a14ee9e45447d5c2

  • SHA1

    f61e70b2463f8e74e58480f8c9edd651216d7a80

  • SHA256

    e55a2fd8d73eba9c29f98a2a02511382d12a01bd54d5d2ccff26a3746561a9df

  • SHA512

    06affc09fa4db1c0a86555d7ededb44c1191e292fc8ebdb91af4d9d6e2b32b7498c673d7bfeeb31867ba166d9251316459e65ad76a7d8fab1e6457aa411e84bb

  • SSDEEP

    6144:Br9bUzkuvcBYC47l2xA0CLzrfn5Agvirxi/NRFBDArL:Br+kuveY3hdLzrfn5A1KtBU

Score
7/10

Malware Config

Targets

    • Target

      e55a2fd8d73eba9c29f98a2a02511382d12a01bd54d5d2ccff26a3746561a9df

    • Size

      316KB

    • MD5

      e66314317049a0e3a14ee9e45447d5c2

    • SHA1

      f61e70b2463f8e74e58480f8c9edd651216d7a80

    • SHA256

      e55a2fd8d73eba9c29f98a2a02511382d12a01bd54d5d2ccff26a3746561a9df

    • SHA512

      06affc09fa4db1c0a86555d7ededb44c1191e292fc8ebdb91af4d9d6e2b32b7498c673d7bfeeb31867ba166d9251316459e65ad76a7d8fab1e6457aa411e84bb

    • SSDEEP

      6144:Br9bUzkuvcBYC47l2xA0CLzrfn5Agvirxi/NRFBDArL:Br+kuveY3hdLzrfn5A1KtBU

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks