General

  • Target

    c6d5aa04160f2dfc55181d0111ac849a1daa19c3e9e72c325e24e6b3a2824b68

  • Size

    313KB

  • Sample

    221123-jeyywaag8t

  • MD5

    3bd9a302bf04ff594012dfe0e405df72

  • SHA1

    450f057a50457b0d04cb99b35b2cdc73fba4b48c

  • SHA256

    c6d5aa04160f2dfc55181d0111ac849a1daa19c3e9e72c325e24e6b3a2824b68

  • SHA512

    1fbfd4cbc49344bb8e8a1be333c2d3af0f390939e3e7b7b5eeeab9a70e859f2fd938f2cd484c2a8029abe6495cbbbc8fb0d30d33cd80ee4a9191a1bda4a21166

  • SSDEEP

    6144:4rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYt:4rk4u6/eIo4nlu7trxFtApfgMyrpjYt

Score
7/10

Malware Config

Targets

    • Target

      c6d5aa04160f2dfc55181d0111ac849a1daa19c3e9e72c325e24e6b3a2824b68

    • Size

      313KB

    • MD5

      3bd9a302bf04ff594012dfe0e405df72

    • SHA1

      450f057a50457b0d04cb99b35b2cdc73fba4b48c

    • SHA256

      c6d5aa04160f2dfc55181d0111ac849a1daa19c3e9e72c325e24e6b3a2824b68

    • SHA512

      1fbfd4cbc49344bb8e8a1be333c2d3af0f390939e3e7b7b5eeeab9a70e859f2fd938f2cd484c2a8029abe6495cbbbc8fb0d30d33cd80ee4a9191a1bda4a21166

    • SSDEEP

      6144:4rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYt:4rk4u6/eIo4nlu7trxFtApfgMyrpjYt

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks