General

  • Target

    c9c9035f9dbd50160f6397819868eb776e6fad50cca8b44abab7423f9c863280

  • Size

    327KB

  • Sample

    221123-jdr4yafc96

  • MD5

    0ae550f82b25dd76ac8ab224ae43ed30

  • SHA1

    a1a19ea65adb03eac4128b7c6371a8dbd573365c

  • SHA256

    c9c9035f9dbd50160f6397819868eb776e6fad50cca8b44abab7423f9c863280

  • SHA512

    9e5948dfec21e65664eed30831bf387c7df9aabbbcb0f2bfd531c17d017fbba8eaac524b04bac7857f5ebce385bac2aa1964128e2d107baf22a84ad90d426615

  • SSDEEP

    6144:Zr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6FO:Zr4iu6/eIo4Rsw33AtsmQH

Score
7/10

Malware Config

Targets

    • Target

      c9c9035f9dbd50160f6397819868eb776e6fad50cca8b44abab7423f9c863280

    • Size

      327KB

    • MD5

      0ae550f82b25dd76ac8ab224ae43ed30

    • SHA1

      a1a19ea65adb03eac4128b7c6371a8dbd573365c

    • SHA256

      c9c9035f9dbd50160f6397819868eb776e6fad50cca8b44abab7423f9c863280

    • SHA512

      9e5948dfec21e65664eed30831bf387c7df9aabbbcb0f2bfd531c17d017fbba8eaac524b04bac7857f5ebce385bac2aa1964128e2d107baf22a84ad90d426615

    • SSDEEP

      6144:Zr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6FO:Zr4iu6/eIo4Rsw33AtsmQH

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks