General

  • Target

    b63b6781da0aa3cbb0cd4bd1f5d4eb1c15113310b289d3c3f6f3e814a1b9105e

  • Size

    314KB

  • Sample

    221123-jncr1afg65

  • MD5

    57cb4f9fa609ab96ee61a9043c0f7e98

  • SHA1

    339ad7905284a0fc783d5202bb85912589348aa3

  • SHA256

    b63b6781da0aa3cbb0cd4bd1f5d4eb1c15113310b289d3c3f6f3e814a1b9105e

  • SHA512

    aeb2a8d3b25eac7cc0446144047420f72ce688d4be3434213a64088b91b4d48672bb33baf3c3c1e4ec57a42ed3f6d72cb3e014e3c74400f4615bff269b6f9c36

  • SSDEEP

    6144:ArAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwh:Ar1kuveY35YO67Wxz7wh

Score
7/10

Malware Config

Targets

    • Target

      b63b6781da0aa3cbb0cd4bd1f5d4eb1c15113310b289d3c3f6f3e814a1b9105e

    • Size

      314KB

    • MD5

      57cb4f9fa609ab96ee61a9043c0f7e98

    • SHA1

      339ad7905284a0fc783d5202bb85912589348aa3

    • SHA256

      b63b6781da0aa3cbb0cd4bd1f5d4eb1c15113310b289d3c3f6f3e814a1b9105e

    • SHA512

      aeb2a8d3b25eac7cc0446144047420f72ce688d4be3434213a64088b91b4d48672bb33baf3c3c1e4ec57a42ed3f6d72cb3e014e3c74400f4615bff269b6f9c36

    • SSDEEP

      6144:ArAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwh:Ar1kuveY35YO67Wxz7wh

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks