General

  • Target

    c389bb0075f9c319a5cd3f14c81a994ec92bc4d1fd43582b0fe0d6b5ed26c9ee

  • Size

    325KB

  • Sample

    221123-jgja7sfe32

  • MD5

    c6bda344756b957fcba3b7a52c68179e

  • SHA1

    fc9005c44c029e54b946c1b7564c38be3f238724

  • SHA256

    c389bb0075f9c319a5cd3f14c81a994ec92bc4d1fd43582b0fe0d6b5ed26c9ee

  • SHA512

    6bc251aa26fa8f17583b39e51e0042b0a02bf4dc44efd3ed85f0e16e65acdb567d172519aa2983ecfc3a7bba324e2d9c35cbf9aed8943e85810b0c02ea1f89c0

  • SSDEEP

    6144:0r1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5os:0r1B3u6/eIo4ArVUBQCCYOqmO5os

Score
7/10

Malware Config

Targets

    • Target

      c389bb0075f9c319a5cd3f14c81a994ec92bc4d1fd43582b0fe0d6b5ed26c9ee

    • Size

      325KB

    • MD5

      c6bda344756b957fcba3b7a52c68179e

    • SHA1

      fc9005c44c029e54b946c1b7564c38be3f238724

    • SHA256

      c389bb0075f9c319a5cd3f14c81a994ec92bc4d1fd43582b0fe0d6b5ed26c9ee

    • SHA512

      6bc251aa26fa8f17583b39e51e0042b0a02bf4dc44efd3ed85f0e16e65acdb567d172519aa2983ecfc3a7bba324e2d9c35cbf9aed8943e85810b0c02ea1f89c0

    • SSDEEP

      6144:0r1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5os:0r1B3u6/eIo4ArVUBQCCYOqmO5os

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks