General

  • Target

    b53e80ce5d5f52e48bc0c2325f3bb5afc1606fdb33c07c5be859265203591a13

  • Size

    313KB

  • Sample

    221123-jnshfsfg73

  • MD5

    3d072735521fca2932aec4c47325a65f

  • SHA1

    15153415b02c51c46b1a27199c0d97ec6ac8dbcc

  • SHA256

    b53e80ce5d5f52e48bc0c2325f3bb5afc1606fdb33c07c5be859265203591a13

  • SHA512

    e9baf5f1ed825f9d71599f7c42c3f122313c23094044f0c49d8651f846b5d842f333904ad40989e9120551be6be2dc4de3d2a8dfda82f16eab6cfe29c1f9ddd3

  • SSDEEP

    6144:yrkP9uEo2S1YnQmCX492DkwNP3qpYFpdteedaMtBxOWUevASojincBS4y:yrkFu6/eIo4mdt2M/lUevAzicK

Score
7/10

Malware Config

Targets

    • Target

      b53e80ce5d5f52e48bc0c2325f3bb5afc1606fdb33c07c5be859265203591a13

    • Size

      313KB

    • MD5

      3d072735521fca2932aec4c47325a65f

    • SHA1

      15153415b02c51c46b1a27199c0d97ec6ac8dbcc

    • SHA256

      b53e80ce5d5f52e48bc0c2325f3bb5afc1606fdb33c07c5be859265203591a13

    • SHA512

      e9baf5f1ed825f9d71599f7c42c3f122313c23094044f0c49d8651f846b5d842f333904ad40989e9120551be6be2dc4de3d2a8dfda82f16eab6cfe29c1f9ddd3

    • SSDEEP

      6144:yrkP9uEo2S1YnQmCX492DkwNP3qpYFpdteedaMtBxOWUevASojincBS4y:yrkFu6/eIo4mdt2M/lUevAzicK

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks