General

  • Target

    86b5fcc5e16cfa5ba218820006e3b3000f912f9a1a8ea47b551e6c1c8d19ab47

  • Size

    327KB

  • Sample

    221123-j135qabf9z

  • MD5

    e6f917b7abb1ff338e3aa9ab7c32f664

  • SHA1

    7e97950f8bc915ade44ed7ae14d88d17a00ec0be

  • SHA256

    86b5fcc5e16cfa5ba218820006e3b3000f912f9a1a8ea47b551e6c1c8d19ab47

  • SHA512

    d99a731eef17738462328a197e19aa91181820fd2cdd18236d9284444ffecfc52c21370030b6cbfe1e0ea52cb73b7c147a54d379e3d73c438aab386c35f9d1ac

  • SSDEEP

    6144:Jr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6F0:Jr4iu6/eIo4Rsw33AtsmQR

Score
7/10

Malware Config

Targets

    • Target

      86b5fcc5e16cfa5ba218820006e3b3000f912f9a1a8ea47b551e6c1c8d19ab47

    • Size

      327KB

    • MD5

      e6f917b7abb1ff338e3aa9ab7c32f664

    • SHA1

      7e97950f8bc915ade44ed7ae14d88d17a00ec0be

    • SHA256

      86b5fcc5e16cfa5ba218820006e3b3000f912f9a1a8ea47b551e6c1c8d19ab47

    • SHA512

      d99a731eef17738462328a197e19aa91181820fd2cdd18236d9284444ffecfc52c21370030b6cbfe1e0ea52cb73b7c147a54d379e3d73c438aab386c35f9d1ac

    • SSDEEP

      6144:Jr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6F0:Jr4iu6/eIo4Rsw33AtsmQR

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks