General

  • Target

    c28d79e89f918dd38cbbdc9c8e25c97474645fe4909221c75a0fb5a4f227749f

  • Size

    313KB

  • Sample

    221123-jg1v9afe48

  • MD5

    846c9ba68a3676de0863ac80713a7687

  • SHA1

    bb251363d8fd3c2b69280fc9690d36f59f34cb21

  • SHA256

    c28d79e89f918dd38cbbdc9c8e25c97474645fe4909221c75a0fb5a4f227749f

  • SHA512

    388266e62ed867f0fd902202b25469498d175d02c148225285f7f01afe50857522736f6c7791c2d44f25be7d1420173e482c76f376660f7be3d1d762fe5e9ae7

  • SSDEEP

    6144:MrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0L/H:Mryu6/eIo4vMResyEf0uP9d9UG0/H

Score
7/10

Malware Config

Targets

    • Target

      c28d79e89f918dd38cbbdc9c8e25c97474645fe4909221c75a0fb5a4f227749f

    • Size

      313KB

    • MD5

      846c9ba68a3676de0863ac80713a7687

    • SHA1

      bb251363d8fd3c2b69280fc9690d36f59f34cb21

    • SHA256

      c28d79e89f918dd38cbbdc9c8e25c97474645fe4909221c75a0fb5a4f227749f

    • SHA512

      388266e62ed867f0fd902202b25469498d175d02c148225285f7f01afe50857522736f6c7791c2d44f25be7d1420173e482c76f376660f7be3d1d762fe5e9ae7

    • SSDEEP

      6144:MrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0L/H:Mryu6/eIo4vMResyEf0uP9d9UG0/H

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks