General

  • Target

    c6b403f1329e718fc4e8e2ef2e03be506262b59fe61686cf3251f52ddc542ca8

  • Size

    327KB

  • Sample

    221123-je1sgaag8w

  • MD5

    cc08880e4141a57a236d84fb732080d8

  • SHA1

    324a0cb83d5f04ffb3c53cafb6b52bfaeaed0e22

  • SHA256

    c6b403f1329e718fc4e8e2ef2e03be506262b59fe61686cf3251f52ddc542ca8

  • SHA512

    cb25f2ca9c7fd7705d4231009d1d64d5803248dcf1029673a51839d3cac6f4f5ea1ee56681dca63f3dc57d765287678bce510ebf9e6cb806b067906637326a97

  • SSDEEP

    6144:Zr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6Fd:Zr4iu6/eIo4Rsw33AtsmQE

Score
7/10

Malware Config

Targets

    • Target

      c6b403f1329e718fc4e8e2ef2e03be506262b59fe61686cf3251f52ddc542ca8

    • Size

      327KB

    • MD5

      cc08880e4141a57a236d84fb732080d8

    • SHA1

      324a0cb83d5f04ffb3c53cafb6b52bfaeaed0e22

    • SHA256

      c6b403f1329e718fc4e8e2ef2e03be506262b59fe61686cf3251f52ddc542ca8

    • SHA512

      cb25f2ca9c7fd7705d4231009d1d64d5803248dcf1029673a51839d3cac6f4f5ea1ee56681dca63f3dc57d765287678bce510ebf9e6cb806b067906637326a97

    • SSDEEP

      6144:Zr469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6Fd:Zr4iu6/eIo4Rsw33AtsmQE

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks