General

  • Target

    c4c1290f38ee660f6232c8ca9de3e287e4908e2df687408e0b0588bc965ead25

  • Size

    313KB

  • Sample

    221123-jfprlaah2y

  • MD5

    99ce7100a59691a117b3fe051df01910

  • SHA1

    6483e0c913f866b43c96837190f43b1170e56ecb

  • SHA256

    c4c1290f38ee660f6232c8ca9de3e287e4908e2df687408e0b0588bc965ead25

  • SHA512

    d6c7e212d617cf50bbe5ce10385ff462077b85e069790e4deef8f0bcee3ec7484de01ff7a095b8b68703b6d6e569cef9d76f8db81196a8b35ee32f7f8c9368ff

  • SSDEEP

    6144:prb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoMB:prRu6/eIo4t3PuFITKUAO

Score
7/10

Malware Config

Targets

    • Target

      c4c1290f38ee660f6232c8ca9de3e287e4908e2df687408e0b0588bc965ead25

    • Size

      313KB

    • MD5

      99ce7100a59691a117b3fe051df01910

    • SHA1

      6483e0c913f866b43c96837190f43b1170e56ecb

    • SHA256

      c4c1290f38ee660f6232c8ca9de3e287e4908e2df687408e0b0588bc965ead25

    • SHA512

      d6c7e212d617cf50bbe5ce10385ff462077b85e069790e4deef8f0bcee3ec7484de01ff7a095b8b68703b6d6e569cef9d76f8db81196a8b35ee32f7f8c9368ff

    • SSDEEP

      6144:prb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoMB:prRu6/eIo4t3PuFITKUAO

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks