General

  • Target

    ef3e723e10a961cb850b8dce470961bc984cea234b26e78978b97596b67e2636

  • Size

    325KB

  • Sample

    221123-hwtj2saa4w

  • MD5

    a4a521e7d9b2a2cf1a0abc96d1220a6f

  • SHA1

    5bb5367bb2ba60a2a819abbfd88b814332505a0c

  • SHA256

    ef3e723e10a961cb850b8dce470961bc984cea234b26e78978b97596b67e2636

  • SHA512

    627f1d07dd70dc212d196ed0c17f5dae6bbac21fa369673279b65486149963345d4aa3fe6a22ee0809a2753080d87f2fb8430677d4881fb353ae1190d39ad2cf

  • SSDEEP

    6144:kr1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5om:kr1B3u6/eIo4ArVUBQCCYOqmO5om

Score
7/10

Malware Config

Targets

    • Target

      ef3e723e10a961cb850b8dce470961bc984cea234b26e78978b97596b67e2636

    • Size

      325KB

    • MD5

      a4a521e7d9b2a2cf1a0abc96d1220a6f

    • SHA1

      5bb5367bb2ba60a2a819abbfd88b814332505a0c

    • SHA256

      ef3e723e10a961cb850b8dce470961bc984cea234b26e78978b97596b67e2636

    • SHA512

      627f1d07dd70dc212d196ed0c17f5dae6bbac21fa369673279b65486149963345d4aa3fe6a22ee0809a2753080d87f2fb8430677d4881fb353ae1190d39ad2cf

    • SSDEEP

      6144:kr1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5om:kr1B3u6/eIo4ArVUBQCCYOqmO5om

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks