General

  • Target

    c0f7c79a4a7f650ab7604851cecb03fc90dad45c20b6ca52a97aeea0aaeff8f0

  • Size

    314KB

  • Sample

    221123-jhttbsfe78

  • MD5

    7047794342f14c9fda3b4cfe06a7651f

  • SHA1

    dc570d9ca160d8d9dc2c3b08c2750b80db19a4b1

  • SHA256

    c0f7c79a4a7f650ab7604851cecb03fc90dad45c20b6ca52a97aeea0aaeff8f0

  • SHA512

    f21c6546f2885f0876b611ef211f6ae046a972ed64d886914ecb3857d16d97599fa5ae1819c8b346d982ea73c80fe33e545564b21219e5f0a4499b1c4e673efa

  • SSDEEP

    6144:orAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwo:or1kuveY35YO67Wxz7wo

Score
7/10

Malware Config

Targets

    • Target

      c0f7c79a4a7f650ab7604851cecb03fc90dad45c20b6ca52a97aeea0aaeff8f0

    • Size

      314KB

    • MD5

      7047794342f14c9fda3b4cfe06a7651f

    • SHA1

      dc570d9ca160d8d9dc2c3b08c2750b80db19a4b1

    • SHA256

      c0f7c79a4a7f650ab7604851cecb03fc90dad45c20b6ca52a97aeea0aaeff8f0

    • SHA512

      f21c6546f2885f0876b611ef211f6ae046a972ed64d886914ecb3857d16d97599fa5ae1819c8b346d982ea73c80fe33e545564b21219e5f0a4499b1c4e673efa

    • SSDEEP

      6144:orAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwo:or1kuveY35YO67Wxz7wo

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks