General

  • Target

    6d842e770c4e6b1a8e08358e3010e98252b8a98711632f009f49ce7ef3bf4f68

  • Size

    316KB

  • Sample

    221123-j632xabh9z

  • MD5

    f4eec2a58beb85c6cdb0ce7790ceddfb

  • SHA1

    b9cbca23c032e28ec822cea39012ec3774fc0ef9

  • SHA256

    6d842e770c4e6b1a8e08358e3010e98252b8a98711632f009f49ce7ef3bf4f68

  • SHA512

    8d34c8c8ece71dea30f846b6bc085c91a9c623475685a6f4cd0f81ca8fe2eabb8a10418adaefa8920a5e345cd5733f817c5cefbf37ac531de0a22ed4d3dc8463

  • SSDEEP

    6144:drybUzkuvcBYC47l2xphuK2+Otbaysqo+/VKitoTxwbs5iD3B2phod:drLkuveY3EMK9ObxD/06s5w3BLd

Score
7/10

Malware Config

Targets

    • Target

      6d842e770c4e6b1a8e08358e3010e98252b8a98711632f009f49ce7ef3bf4f68

    • Size

      316KB

    • MD5

      f4eec2a58beb85c6cdb0ce7790ceddfb

    • SHA1

      b9cbca23c032e28ec822cea39012ec3774fc0ef9

    • SHA256

      6d842e770c4e6b1a8e08358e3010e98252b8a98711632f009f49ce7ef3bf4f68

    • SHA512

      8d34c8c8ece71dea30f846b6bc085c91a9c623475685a6f4cd0f81ca8fe2eabb8a10418adaefa8920a5e345cd5733f817c5cefbf37ac531de0a22ed4d3dc8463

    • SSDEEP

      6144:drybUzkuvcBYC47l2xphuK2+Otbaysqo+/VKitoTxwbs5iD3B2phod:drLkuveY3EMK9ObxD/06s5w3BLd

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks