General

  • Target

    dd3e003e6c9799579db7a520b581ec10e8c7e644b9aedddd9c290f6ea94078d5

  • Size

    313KB

  • Sample

    221123-h5dvyseh74

  • MD5

    df9efb124082c0c14db88c5a87a4d44f

  • SHA1

    6e324faefd5f8d41132dfa3ccc184b5c1d5302e4

  • SHA256

    dd3e003e6c9799579db7a520b581ec10e8c7e644b9aedddd9c290f6ea94078d5

  • SHA512

    ce84118a9067d7a68d4f1b89e1cf6348fa3c2d105f1a45f5b7ece2dbe97cfb2b6450b978107bb806fbab00d26e889481c3bd5e1cf1e49aa0aa6c7c0ff55dbe91

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYU:Ark4u6/eIo4nlu7trxFtApfgMyrpjYU

Score
7/10

Malware Config

Targets

    • Target

      dd3e003e6c9799579db7a520b581ec10e8c7e644b9aedddd9c290f6ea94078d5

    • Size

      313KB

    • MD5

      df9efb124082c0c14db88c5a87a4d44f

    • SHA1

      6e324faefd5f8d41132dfa3ccc184b5c1d5302e4

    • SHA256

      dd3e003e6c9799579db7a520b581ec10e8c7e644b9aedddd9c290f6ea94078d5

    • SHA512

      ce84118a9067d7a68d4f1b89e1cf6348fa3c2d105f1a45f5b7ece2dbe97cfb2b6450b978107bb806fbab00d26e889481c3bd5e1cf1e49aa0aa6c7c0ff55dbe91

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYU:Ark4u6/eIo4nlu7trxFtApfgMyrpjYU

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks