General

  • Target

    84bee1888070bba9ddcac534cd96ac21aa46c8f6add0db8def75dbe84f565045

  • Size

    325KB

  • Sample

    221123-j2fqtabg3v

  • MD5

    ce9a36d2d1b5b79ea71a52d4f34ce13d

  • SHA1

    24c473c278360a796cae8d27cb7faaa363cdaad2

  • SHA256

    84bee1888070bba9ddcac534cd96ac21aa46c8f6add0db8def75dbe84f565045

  • SHA512

    b1f1e49d1ae2bd97abba20df9a78083b2c4ae445538d4eeceb55e927f3f1fa7f302f0044d3f16f29d4ab302d904e7479facdad577825c06f9306e4a83cb5db97

  • SSDEEP

    6144:0r1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oB:0r1B3u6/eIo4ArVUBQCCYOqmO5oB

Score
7/10

Malware Config

Targets

    • Target

      84bee1888070bba9ddcac534cd96ac21aa46c8f6add0db8def75dbe84f565045

    • Size

      325KB

    • MD5

      ce9a36d2d1b5b79ea71a52d4f34ce13d

    • SHA1

      24c473c278360a796cae8d27cb7faaa363cdaad2

    • SHA256

      84bee1888070bba9ddcac534cd96ac21aa46c8f6add0db8def75dbe84f565045

    • SHA512

      b1f1e49d1ae2bd97abba20df9a78083b2c4ae445538d4eeceb55e927f3f1fa7f302f0044d3f16f29d4ab302d904e7479facdad577825c06f9306e4a83cb5db97

    • SSDEEP

      6144:0r1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oB:0r1B3u6/eIo4ArVUBQCCYOqmO5oB

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks