General

  • Target

    b721847526fcca10cdb0740ff8f124047b6db1d7f6facf1b2f6ee690dd4aceb0

  • Size

    313KB

  • Sample

    221123-jmz6xabb3z

  • MD5

    4e2e40a0dbc93a4e9d0ffd1ff36a5452

  • SHA1

    0a17a0eda93ca2339afbe329a2d3e225d71efd1b

  • SHA256

    b721847526fcca10cdb0740ff8f124047b6db1d7f6facf1b2f6ee690dd4aceb0

  • SHA512

    4551e82449731c8a21c645c816091ce0b309595f664bb9e5c1272de9b6b0c574d7e6eb57af5b9b2a4450b22fbed12c0d4a2887902115380834bd89cbe544c04c

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYT:Ark4u6/eIo4nlu7trxFtApfgMyrpjYT

Score
7/10

Malware Config

Targets

    • Target

      b721847526fcca10cdb0740ff8f124047b6db1d7f6facf1b2f6ee690dd4aceb0

    • Size

      313KB

    • MD5

      4e2e40a0dbc93a4e9d0ffd1ff36a5452

    • SHA1

      0a17a0eda93ca2339afbe329a2d3e225d71efd1b

    • SHA256

      b721847526fcca10cdb0740ff8f124047b6db1d7f6facf1b2f6ee690dd4aceb0

    • SHA512

      4551e82449731c8a21c645c816091ce0b309595f664bb9e5c1272de9b6b0c574d7e6eb57af5b9b2a4450b22fbed12c0d4a2887902115380834bd89cbe544c04c

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYT:Ark4u6/eIo4nlu7trxFtApfgMyrpjYT

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks