General

  • Target

    7fcb3f7896814b11e40fa6634703862aabae538cd4802746e63b051775857f75

  • Size

    314KB

  • Sample

    221123-j3fr7sgd73

  • MD5

    bcb1a0f7e58034e044fc18d038733c68

  • SHA1

    a967c8fe089e78cd83a31bab153103e31327d90f

  • SHA256

    7fcb3f7896814b11e40fa6634703862aabae538cd4802746e63b051775857f75

  • SHA512

    1180c5fae426d698644e9f701aa72fa84e56e37533d7fa996ca274416289846e0d095d10d2e50bfeb7c3eacfecb20b952ab59a1f980d373096ccd8594fb95834

  • SSDEEP

    6144:grAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwG:gr1kuveY35YO67Wxz7wG

Score
7/10

Malware Config

Targets

    • Target

      7fcb3f7896814b11e40fa6634703862aabae538cd4802746e63b051775857f75

    • Size

      314KB

    • MD5

      bcb1a0f7e58034e044fc18d038733c68

    • SHA1

      a967c8fe089e78cd83a31bab153103e31327d90f

    • SHA256

      7fcb3f7896814b11e40fa6634703862aabae538cd4802746e63b051775857f75

    • SHA512

      1180c5fae426d698644e9f701aa72fa84e56e37533d7fa996ca274416289846e0d095d10d2e50bfeb7c3eacfecb20b952ab59a1f980d373096ccd8594fb95834

    • SSDEEP

      6144:grAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwG:gr1kuveY35YO67Wxz7wG

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks