General

  • Target

    67ed44019e0d1e5232cccc094859e02c34875c49443c6c909dcc1e8af8ba5fa5

  • Size

    313KB

  • Sample

    221123-j765ysgf49

  • MD5

    bd2e3a3dabcb2ebafc9f6e0a71cd8978

  • SHA1

    b06116091b32299b221166b0c546f7683dd9cc37

  • SHA256

    67ed44019e0d1e5232cccc094859e02c34875c49443c6c909dcc1e8af8ba5fa5

  • SHA512

    20b735a55ca0a02ea40e159ef789caeb92193095357b8a27a73c79c3d009a28f4878dd2ef0b87f4a39bbffde2b8563cce5bef768327878feb855c4495f5d8720

  • SSDEEP

    6144:krK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Lc:kryu6/eIo4vMResyEf0uP9d9UG0c

Score
7/10

Malware Config

Targets

    • Target

      67ed44019e0d1e5232cccc094859e02c34875c49443c6c909dcc1e8af8ba5fa5

    • Size

      313KB

    • MD5

      bd2e3a3dabcb2ebafc9f6e0a71cd8978

    • SHA1

      b06116091b32299b221166b0c546f7683dd9cc37

    • SHA256

      67ed44019e0d1e5232cccc094859e02c34875c49443c6c909dcc1e8af8ba5fa5

    • SHA512

      20b735a55ca0a02ea40e159ef789caeb92193095357b8a27a73c79c3d009a28f4878dd2ef0b87f4a39bbffde2b8563cce5bef768327878feb855c4495f5d8720

    • SSDEEP

      6144:krK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Lc:kryu6/eIo4vMResyEf0uP9d9UG0c

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks