General

  • Target

    c2fb77fbe0cc76b5b0e042df098fc45e268683a72a6de154ee2fd11b7fc6fa4f

  • Size

    325KB

  • Sample

    221123-jgt3psah5w

  • MD5

    f6b99820bdfe5c1cdc50c4e5f706ec41

  • SHA1

    2b1f6ef31104bb3d04e67b2a8d59f3ea0f8b9596

  • SHA256

    c2fb77fbe0cc76b5b0e042df098fc45e268683a72a6de154ee2fd11b7fc6fa4f

  • SHA512

    89e3d1faf94429fb7a1bc1b9fda40a0bcb29094be9ad6c0ac98db47fc9949ab0e59bb8c104a058cef1efb41851097d6c4e849442895a68a47462e96d204fe5f8

  • SSDEEP

    6144:Ur1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oH:Ur1B3u6/eIo4ArVUBQCCYOqmO5oH

Score
7/10

Malware Config

Targets

    • Target

      c2fb77fbe0cc76b5b0e042df098fc45e268683a72a6de154ee2fd11b7fc6fa4f

    • Size

      325KB

    • MD5

      f6b99820bdfe5c1cdc50c4e5f706ec41

    • SHA1

      2b1f6ef31104bb3d04e67b2a8d59f3ea0f8b9596

    • SHA256

      c2fb77fbe0cc76b5b0e042df098fc45e268683a72a6de154ee2fd11b7fc6fa4f

    • SHA512

      89e3d1faf94429fb7a1bc1b9fda40a0bcb29094be9ad6c0ac98db47fc9949ab0e59bb8c104a058cef1efb41851097d6c4e849442895a68a47462e96d204fe5f8

    • SSDEEP

      6144:Ur1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oH:Ur1B3u6/eIo4ArVUBQCCYOqmO5oH

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks