General

  • Target

    85bd12d68bc835098dd1a4f4b9c28009ef3416d8b2027f39fd50f048e8a1caff

  • Size

    313KB

  • Sample

    221123-j2ajssbg2x

  • MD5

    dea4fa0623e5dd882da16092a31e3d25

  • SHA1

    8cbc694aa8fcb45d5e8c956e594b638fe5fde2fa

  • SHA256

    85bd12d68bc835098dd1a4f4b9c28009ef3416d8b2027f39fd50f048e8a1caff

  • SHA512

    a9c8f9df3d55a4e0aff1d702a597fa1803048d7856f95e1cc12864fba631bfe076543248a5a51d5074b0d52e3b77593d0a507f33c43ecc27e9f069a800ba11f1

  • SSDEEP

    6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzn:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5i

Score
7/10

Malware Config

Targets

    • Target

      85bd12d68bc835098dd1a4f4b9c28009ef3416d8b2027f39fd50f048e8a1caff

    • Size

      313KB

    • MD5

      dea4fa0623e5dd882da16092a31e3d25

    • SHA1

      8cbc694aa8fcb45d5e8c956e594b638fe5fde2fa

    • SHA256

      85bd12d68bc835098dd1a4f4b9c28009ef3416d8b2027f39fd50f048e8a1caff

    • SHA512

      a9c8f9df3d55a4e0aff1d702a597fa1803048d7856f95e1cc12864fba631bfe076543248a5a51d5074b0d52e3b77593d0a507f33c43ecc27e9f069a800ba11f1

    • SSDEEP

      6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzn:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5i

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks