General

  • Target

    da8556a5a9e049af1b7ffc6b7a51308cdfb5704202cd7974aaefe93c182f2645

  • Size

    313KB

  • Sample

    221123-h6gm8sfa27

  • MD5

    5abd1740f542dbbde2d9759f48d2a372

  • SHA1

    72fbdb394ee0dd5aceff72582830a39dc02047ea

  • SHA256

    da8556a5a9e049af1b7ffc6b7a51308cdfb5704202cd7974aaefe93c182f2645

  • SHA512

    6b767fce0ce08ed5c727635bb5be1a53d1c1f3e35272349b7c118844203d6ff3772f28c7011a7b9c04c4d2884cdcb53efa5d1bc355926a4e41bc08e95e2f5633

  • SSDEEP

    6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Ll:Hryu6/eIo4vMResyEf0uP9d9UG0l

Score
7/10

Malware Config

Targets

    • Target

      da8556a5a9e049af1b7ffc6b7a51308cdfb5704202cd7974aaefe93c182f2645

    • Size

      313KB

    • MD5

      5abd1740f542dbbde2d9759f48d2a372

    • SHA1

      72fbdb394ee0dd5aceff72582830a39dc02047ea

    • SHA256

      da8556a5a9e049af1b7ffc6b7a51308cdfb5704202cd7974aaefe93c182f2645

    • SHA512

      6b767fce0ce08ed5c727635bb5be1a53d1c1f3e35272349b7c118844203d6ff3772f28c7011a7b9c04c4d2884cdcb53efa5d1bc355926a4e41bc08e95e2f5633

    • SSDEEP

      6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Ll:Hryu6/eIo4vMResyEf0uP9d9UG0l

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks