General

  • Target

    d99977e81ccb589bb6c987ab6d5d9a9a3950c9d878670eff92b97b4683309d41

  • Size

    316KB

  • Sample

    221123-h6vvvsfa39

  • MD5

    224ca2ee601d645400a1084d5061808d

  • SHA1

    75bf7eb5ef52066b2fc2d1dffe30144152787553

  • SHA256

    d99977e81ccb589bb6c987ab6d5d9a9a3950c9d878670eff92b97b4683309d41

  • SHA512

    9973997d6fe4777bd371dc0540d3fd29e2e5961ec73caa2b99896a582d91fd8f753f0fbc720188080ede5e262258095430a6dfb678a5806f2f95dcaf89ee373c

  • SSDEEP

    6144:/rFbUzkuvcBYC47l2xWFAS3r/n2KvN48uFPPDZyMZ:/r2kuveY3ZF31N4XxZjZ

Score
7/10

Malware Config

Targets

    • Target

      d99977e81ccb589bb6c987ab6d5d9a9a3950c9d878670eff92b97b4683309d41

    • Size

      316KB

    • MD5

      224ca2ee601d645400a1084d5061808d

    • SHA1

      75bf7eb5ef52066b2fc2d1dffe30144152787553

    • SHA256

      d99977e81ccb589bb6c987ab6d5d9a9a3950c9d878670eff92b97b4683309d41

    • SHA512

      9973997d6fe4777bd371dc0540d3fd29e2e5961ec73caa2b99896a582d91fd8f753f0fbc720188080ede5e262258095430a6dfb678a5806f2f95dcaf89ee373c

    • SSDEEP

      6144:/rFbUzkuvcBYC47l2xWFAS3r/n2KvN48uFPPDZyMZ:/r2kuveY3ZF31N4XxZjZ

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks