General

  • Target

    b7e500655e8608bbf849690aa1f6cb33f06f428ab9475a148622c63a0e6afc47

  • Size

    313KB

  • Sample

    221123-jmlnhsfg44

  • MD5

    bd7612a5ca822e95797ea0a3ca94b9a3

  • SHA1

    7837b01fa6d8f4e0c41c67f8a5cd1e832054ad1c

  • SHA256

    b7e500655e8608bbf849690aa1f6cb33f06f428ab9475a148622c63a0e6afc47

  • SHA512

    182ef14290e5f550fc8598f5994f6d2a54e6058de5cf955b7057b363f7d640850e6118965b965ed4ba5014b40a994214d7fa68d092b8b10f1f9a4631cfbf9f9f

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYl:Ark4u6/eIo4nlu7trxFtApfgMyrpjYl

Score
7/10

Malware Config

Targets

    • Target

      b7e500655e8608bbf849690aa1f6cb33f06f428ab9475a148622c63a0e6afc47

    • Size

      313KB

    • MD5

      bd7612a5ca822e95797ea0a3ca94b9a3

    • SHA1

      7837b01fa6d8f4e0c41c67f8a5cd1e832054ad1c

    • SHA256

      b7e500655e8608bbf849690aa1f6cb33f06f428ab9475a148622c63a0e6afc47

    • SHA512

      182ef14290e5f550fc8598f5994f6d2a54e6058de5cf955b7057b363f7d640850e6118965b965ed4ba5014b40a994214d7fa68d092b8b10f1f9a4631cfbf9f9f

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYl:Ark4u6/eIo4nlu7trxFtApfgMyrpjYl

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks