General

  • Target

    c7134c3eb952c70b66c26757bc7fd3f02d52e0e34704fab8751eb509c9e8ea7a

  • Size

    313KB

  • Sample

    221123-jev7zsag71

  • MD5

    cbf1090f67ce6e6385ac58a1056f2b93

  • SHA1

    052a242ebd1af8f4b71869072017725468f2119b

  • SHA256

    c7134c3eb952c70b66c26757bc7fd3f02d52e0e34704fab8751eb509c9e8ea7a

  • SHA512

    5ac43e4ff54c280df5a6180731f43169b37ee99e1363ffe912bd51194426e531e0a30f9c16e2aa670db13770ebbb67f61b7e24af2bb491ee5fe9f709a528a95f

  • SSDEEP

    6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LvV:Hryu6/eIo4vMResyEf0uP9d9UG09

Score
7/10

Malware Config

Targets

    • Target

      c7134c3eb952c70b66c26757bc7fd3f02d52e0e34704fab8751eb509c9e8ea7a

    • Size

      313KB

    • MD5

      cbf1090f67ce6e6385ac58a1056f2b93

    • SHA1

      052a242ebd1af8f4b71869072017725468f2119b

    • SHA256

      c7134c3eb952c70b66c26757bc7fd3f02d52e0e34704fab8751eb509c9e8ea7a

    • SHA512

      5ac43e4ff54c280df5a6180731f43169b37ee99e1363ffe912bd51194426e531e0a30f9c16e2aa670db13770ebbb67f61b7e24af2bb491ee5fe9f709a528a95f

    • SSDEEP

      6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LvV:Hryu6/eIo4vMResyEf0uP9d9UG09

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks