General

  • Target

    c2eba2db80a3cc1c0ad05ceaafeb600e20ce0e7e37dfdf489148ca503205d7c8

  • Size

    314KB

  • Sample

    221123-jgwarsfe43

  • MD5

    d47cb8bec8833bc96ff4576e4ec598a6

  • SHA1

    6a33850b83ebdaf48af17e5f32d70fef68bb91bd

  • SHA256

    c2eba2db80a3cc1c0ad05ceaafeb600e20ce0e7e37dfdf489148ca503205d7c8

  • SHA512

    79b4e49f6a1c7095309d4199c32a873477126cbb45f58a3352c4f39732c7cbe8f1adc0a1062dfe46e6e2801b019336e6f1a759be4cd58657d6e4cdd53f315a05

  • SSDEEP

    6144:4rAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwn:4r1kuveY35YO67Wxz7wn

Score
7/10

Malware Config

Targets

    • Target

      c2eba2db80a3cc1c0ad05ceaafeb600e20ce0e7e37dfdf489148ca503205d7c8

    • Size

      314KB

    • MD5

      d47cb8bec8833bc96ff4576e4ec598a6

    • SHA1

      6a33850b83ebdaf48af17e5f32d70fef68bb91bd

    • SHA256

      c2eba2db80a3cc1c0ad05ceaafeb600e20ce0e7e37dfdf489148ca503205d7c8

    • SHA512

      79b4e49f6a1c7095309d4199c32a873477126cbb45f58a3352c4f39732c7cbe8f1adc0a1062dfe46e6e2801b019336e6f1a759be4cd58657d6e4cdd53f315a05

    • SSDEEP

      6144:4rAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwn:4r1kuveY35YO67Wxz7wn

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks