General

  • Target

    b77e571384c8c5bd0d576ee1192f02b8598e8bad2a3a22bcaeffd9e405ed339a

  • Size

    313KB

  • Sample

    221123-jmqmgafg49

  • MD5

    20280bfce3103d813d8a39eae05dae39

  • SHA1

    af9c55bffabe2f7b0f7579a8e4c2670e53c8fb7b

  • SHA256

    b77e571384c8c5bd0d576ee1192f02b8598e8bad2a3a22bcaeffd9e405ed339a

  • SHA512

    bdbad71409738f7f8d392c987e3c7722fca1e72655ff5cfa3bc920ccf2286a5bff6f1e6b30742df645cfa0d3a3f10e93ef946026118ed2555b45db1e3708c7c7

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYK:Ark4u6/eIo4nlu7trxFtApfgMyrpjYK

Score
7/10

Malware Config

Targets

    • Target

      b77e571384c8c5bd0d576ee1192f02b8598e8bad2a3a22bcaeffd9e405ed339a

    • Size

      313KB

    • MD5

      20280bfce3103d813d8a39eae05dae39

    • SHA1

      af9c55bffabe2f7b0f7579a8e4c2670e53c8fb7b

    • SHA256

      b77e571384c8c5bd0d576ee1192f02b8598e8bad2a3a22bcaeffd9e405ed339a

    • SHA512

      bdbad71409738f7f8d392c987e3c7722fca1e72655ff5cfa3bc920ccf2286a5bff6f1e6b30742df645cfa0d3a3f10e93ef946026118ed2555b45db1e3708c7c7

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYK:Ark4u6/eIo4nlu7trxFtApfgMyrpjYK

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks