General

  • Target

    b4e1d13702f06bca3b0d382d3d39c4cbc3a935c5d998228fb62f4f551657df1c

  • Size

    314KB

  • Sample

    221123-jnzlrsfg78

  • MD5

    97dfcf6a7a2ec541b35988bae10db3b9

  • SHA1

    ccfb76c2fb0ed5fb4c59c84866150c159585f7fc

  • SHA256

    b4e1d13702f06bca3b0d382d3d39c4cbc3a935c5d998228fb62f4f551657df1c

  • SHA512

    f28a281b8ebdb2d580291201324df63a68acca0b3e67db663341c6da1f90b92256cc48de438ea213bbe6dfa1cdbf3526b673c3401a5b59e783c5d5f526347342

  • SSDEEP

    6144:6rUbUzkuvcBYC47l2xbs1rBP+2jIPaHppF/AG7d1ZBcxsJ3:6rJkuveY3aspBG2KaHppxAq11J3

Score
7/10

Malware Config

Targets

    • Target

      b4e1d13702f06bca3b0d382d3d39c4cbc3a935c5d998228fb62f4f551657df1c

    • Size

      314KB

    • MD5

      97dfcf6a7a2ec541b35988bae10db3b9

    • SHA1

      ccfb76c2fb0ed5fb4c59c84866150c159585f7fc

    • SHA256

      b4e1d13702f06bca3b0d382d3d39c4cbc3a935c5d998228fb62f4f551657df1c

    • SHA512

      f28a281b8ebdb2d580291201324df63a68acca0b3e67db663341c6da1f90b92256cc48de438ea213bbe6dfa1cdbf3526b673c3401a5b59e783c5d5f526347342

    • SSDEEP

      6144:6rUbUzkuvcBYC47l2xbs1rBP+2jIPaHppF/AG7d1ZBcxsJ3:6rJkuveY3aspBG2KaHppxAq11J3

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks