General

  • Target

    b8d2763e9002c715a9a9cf1ca984912f06c16503d9dca4b56229e367c0f1948b

  • Size

    313KB

  • Sample

    221123-jl7jlaba9y

  • MD5

    d9e5f4354d5112c9f3474a7510de2426

  • SHA1

    a90bf0fc5949accd2e94a324b5568638a8750e08

  • SHA256

    b8d2763e9002c715a9a9cf1ca984912f06c16503d9dca4b56229e367c0f1948b

  • SHA512

    a8ac6d1e5e81d6fb8c63095f5305478c1ace64e0ebeba497d3b2bcddd22ef64d5fcd621cfbec06749ac0e96926d9f22d986b1c4596cac5a36792716bb3749c19

  • SSDEEP

    6144:5rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYD:5rk4u6/eIo4nlu7trxFtApfgMyrpjYD

Score
7/10

Malware Config

Targets

    • Target

      b8d2763e9002c715a9a9cf1ca984912f06c16503d9dca4b56229e367c0f1948b

    • Size

      313KB

    • MD5

      d9e5f4354d5112c9f3474a7510de2426

    • SHA1

      a90bf0fc5949accd2e94a324b5568638a8750e08

    • SHA256

      b8d2763e9002c715a9a9cf1ca984912f06c16503d9dca4b56229e367c0f1948b

    • SHA512

      a8ac6d1e5e81d6fb8c63095f5305478c1ace64e0ebeba497d3b2bcddd22ef64d5fcd621cfbec06749ac0e96926d9f22d986b1c4596cac5a36792716bb3749c19

    • SSDEEP

      6144:5rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYD:5rk4u6/eIo4nlu7trxFtApfgMyrpjYD

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks