General

  • Target

    c2fe1fdd3ae175bf4f9148b91d9da878110982c8d3c60e4720b2ab9785d92625

  • Size

    314KB

  • Sample

    221123-jgtf6sah5v

  • MD5

    af62f83e0ab771a54f4be0873f96e1b2

  • SHA1

    37a6f481ce1d9c422dd6aea1b4c6fa5e07704418

  • SHA256

    c2fe1fdd3ae175bf4f9148b91d9da878110982c8d3c60e4720b2ab9785d92625

  • SHA512

    2d3b9b37d1c4f8c75f0092d16846bcacf864a16e447bf02bb323a906d41fbcabdd62e0a5de922274106eede24ebb0151ab0db6d2d820c90009b930a8b4a01920

  • SSDEEP

    6144:6r5bUzkuvcBYC47l2xGnV6OjJaV490B6lKPk3JDEbk0teSVtM:6rqkuveY3RnV6c800oIpbv0SVtM

Score
7/10

Malware Config

Targets

    • Target

      c2fe1fdd3ae175bf4f9148b91d9da878110982c8d3c60e4720b2ab9785d92625

    • Size

      314KB

    • MD5

      af62f83e0ab771a54f4be0873f96e1b2

    • SHA1

      37a6f481ce1d9c422dd6aea1b4c6fa5e07704418

    • SHA256

      c2fe1fdd3ae175bf4f9148b91d9da878110982c8d3c60e4720b2ab9785d92625

    • SHA512

      2d3b9b37d1c4f8c75f0092d16846bcacf864a16e447bf02bb323a906d41fbcabdd62e0a5de922274106eede24ebb0151ab0db6d2d820c90009b930a8b4a01920

    • SSDEEP

      6144:6r5bUzkuvcBYC47l2xGnV6OjJaV490B6lKPk3JDEbk0teSVtM:6rqkuveY3RnV6c800oIpbv0SVtM

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks