General

  • Target

    e2bd2010b682e0eed36cf251a4ffaa50cf540c842e9b453d5b4e03b6d6b7caef

  • Size

    327KB

  • Sample

    221123-h2z9saac4z

  • MD5

    d680b72d5e63a6dbd001de72005bea78

  • SHA1

    9c8adbe2cb2fd7c64b4abde71f17202414a1d86f

  • SHA256

    e2bd2010b682e0eed36cf251a4ffaa50cf540c842e9b453d5b4e03b6d6b7caef

  • SHA512

    8aa20d0535623481f6d439ec4b568528293a600742f4e3811cc78345cee18bec2085c5e1087ab23ef4d21b58e6614bbf9a2b09aaea333fc6eb22d47690d01dce

  • SSDEEP

    6144:Rr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6F6:Rr4iu6/eIo4Rsw33AtsmQr

Score
7/10

Malware Config

Targets

    • Target

      e2bd2010b682e0eed36cf251a4ffaa50cf540c842e9b453d5b4e03b6d6b7caef

    • Size

      327KB

    • MD5

      d680b72d5e63a6dbd001de72005bea78

    • SHA1

      9c8adbe2cb2fd7c64b4abde71f17202414a1d86f

    • SHA256

      e2bd2010b682e0eed36cf251a4ffaa50cf540c842e9b453d5b4e03b6d6b7caef

    • SHA512

      8aa20d0535623481f6d439ec4b568528293a600742f4e3811cc78345cee18bec2085c5e1087ab23ef4d21b58e6614bbf9a2b09aaea333fc6eb22d47690d01dce

    • SSDEEP

      6144:Rr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6F6:Rr4iu6/eIo4Rsw33AtsmQr

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks