General

  • Target

    617b4b20a67f8cd8cd1ab929e3dd1279784fb89bbedf4a03a9dc42515f8b921a

  • Size

    314KB

  • Sample

    221123-j9jgnsgf89

  • MD5

    bc90646b4a184027c06e54353e881d04

  • SHA1

    079b0f430300ed6fc66807651ea6e7b990aa5510

  • SHA256

    617b4b20a67f8cd8cd1ab929e3dd1279784fb89bbedf4a03a9dc42515f8b921a

  • SHA512

    3483d145050e2d31c2129bff673f9bc4f37c51d88e5f5461f14abe0d5bda687444f0c6c3d2a2c5cc5cf6542ea71d8e4ef3cc05bcc66acf0082b67b31ef99db45

  • SSDEEP

    6144:ar5bUzkuvcBYC47l2xGnV6OjJaV490B6lKPk3JDEbk0teSVtk:arqkuveY3RnV6c800oIpbv0SVtk

Score
7/10

Malware Config

Targets

    • Target

      617b4b20a67f8cd8cd1ab929e3dd1279784fb89bbedf4a03a9dc42515f8b921a

    • Size

      314KB

    • MD5

      bc90646b4a184027c06e54353e881d04

    • SHA1

      079b0f430300ed6fc66807651ea6e7b990aa5510

    • SHA256

      617b4b20a67f8cd8cd1ab929e3dd1279784fb89bbedf4a03a9dc42515f8b921a

    • SHA512

      3483d145050e2d31c2129bff673f9bc4f37c51d88e5f5461f14abe0d5bda687444f0c6c3d2a2c5cc5cf6542ea71d8e4ef3cc05bcc66acf0082b67b31ef99db45

    • SSDEEP

      6144:ar5bUzkuvcBYC47l2xGnV6OjJaV490B6lKPk3JDEbk0teSVtk:arqkuveY3RnV6c800oIpbv0SVtk

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks