General

  • Target

    c6ff0cbd5052e905549b1e5777c38f2f46c1e58cfeb6427a9be17e169228cb6c

  • Size

    316KB

  • Sample

    221123-jex2ksag8s

  • MD5

    6e1f4bd347114aef51810d019f84ee83

  • SHA1

    2b01b359f30b2cce13d2966c29ed038f2b4beb1e

  • SHA256

    c6ff0cbd5052e905549b1e5777c38f2f46c1e58cfeb6427a9be17e169228cb6c

  • SHA512

    f22511639e9107062cea694ebcbeb48ca7130e8751769040359e6d199221ae2546f50f81667048d6eabe1891fe76a401a47a34da0d40106aaefdda1d7921dcc4

  • SSDEEP

    6144:lrybUzkuvcBYC47l2xphuK2+Otbaysqo+/VKitoTxwbs5iD3B2pho7:lrLkuveY3EMK9ObxD/06s5w3BL7

Score
7/10

Malware Config

Targets

    • Target

      c6ff0cbd5052e905549b1e5777c38f2f46c1e58cfeb6427a9be17e169228cb6c

    • Size

      316KB

    • MD5

      6e1f4bd347114aef51810d019f84ee83

    • SHA1

      2b01b359f30b2cce13d2966c29ed038f2b4beb1e

    • SHA256

      c6ff0cbd5052e905549b1e5777c38f2f46c1e58cfeb6427a9be17e169228cb6c

    • SHA512

      f22511639e9107062cea694ebcbeb48ca7130e8751769040359e6d199221ae2546f50f81667048d6eabe1891fe76a401a47a34da0d40106aaefdda1d7921dcc4

    • SSDEEP

      6144:lrybUzkuvcBYC47l2xphuK2+Otbaysqo+/VKitoTxwbs5iD3B2pho7:lrLkuveY3EMK9ObxD/06s5w3BL7

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks