General

  • Target

    c32f46757f1ea35e18d8e2b7482e012fafc73d95b14fba5ab5dd8b9ceed00cb8

  • Size

    316KB

  • Sample

    221123-jgnwpafe36

  • MD5

    6daada54f33d03bf940125f401e37052

  • SHA1

    5fbb1fd10fad550064f0c9da7767a5acd46f8a41

  • SHA256

    c32f46757f1ea35e18d8e2b7482e012fafc73d95b14fba5ab5dd8b9ceed00cb8

  • SHA512

    c705dbd3d3ca45b04d0162745e745dc3c1c858c8f84f64e29c057a7397c6c486193fcd216943e53e4c88a2f1cc7f46917c1c7eacefd083dd316c664c6ebe0fa4

  • SSDEEP

    6144:zr/bUzkuvcBYC47l2xij4YTfpczmap8spMPed0VdtM9BdjhYq:zr0kuveY3cY1cia66MGd0Vs9BdN9

Score
7/10

Malware Config

Targets

    • Target

      c32f46757f1ea35e18d8e2b7482e012fafc73d95b14fba5ab5dd8b9ceed00cb8

    • Size

      316KB

    • MD5

      6daada54f33d03bf940125f401e37052

    • SHA1

      5fbb1fd10fad550064f0c9da7767a5acd46f8a41

    • SHA256

      c32f46757f1ea35e18d8e2b7482e012fafc73d95b14fba5ab5dd8b9ceed00cb8

    • SHA512

      c705dbd3d3ca45b04d0162745e745dc3c1c858c8f84f64e29c057a7397c6c486193fcd216943e53e4c88a2f1cc7f46917c1c7eacefd083dd316c664c6ebe0fa4

    • SSDEEP

      6144:zr/bUzkuvcBYC47l2xij4YTfpczmap8spMPed0VdtM9BdjhYq:zr0kuveY3cY1cia66MGd0Vs9BdN9

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks