General

  • Target

    b4244a968826c7aa6a4f32baf2c5dc06c6ececf3db418414c5f168f70923d2a6

  • Size

    315KB

  • Sample

    221123-jpazssbb7z

  • MD5

    20c1e1c85718f58105f94101f997e02b

  • SHA1

    f7100a3739b902e21f2e3b86c7d82774f9f49265

  • SHA256

    b4244a968826c7aa6a4f32baf2c5dc06c6ececf3db418414c5f168f70923d2a6

  • SHA512

    f4c87358616b561d41a08ffdf292bb2ab037c9e129576fc95dba3e44e45c4c0fcb3294863ff7fd517f94d36500dabac5c9e983f3d0fb7c6e19e08a27d43448c3

  • SSDEEP

    6144:UrYbUzkuvcBYC47l2xLnvhueEZdkKQ3+7Oj7hTOVA1HWZA:UrdkuveY3CvI5Zdkj6OEu1HSA

Score
7/10

Malware Config

Targets

    • Target

      b4244a968826c7aa6a4f32baf2c5dc06c6ececf3db418414c5f168f70923d2a6

    • Size

      315KB

    • MD5

      20c1e1c85718f58105f94101f997e02b

    • SHA1

      f7100a3739b902e21f2e3b86c7d82774f9f49265

    • SHA256

      b4244a968826c7aa6a4f32baf2c5dc06c6ececf3db418414c5f168f70923d2a6

    • SHA512

      f4c87358616b561d41a08ffdf292bb2ab037c9e129576fc95dba3e44e45c4c0fcb3294863ff7fd517f94d36500dabac5c9e983f3d0fb7c6e19e08a27d43448c3

    • SSDEEP

      6144:UrYbUzkuvcBYC47l2xLnvhueEZdkKQ3+7Oj7hTOVA1HWZA:UrdkuveY3CvI5Zdkj6OEu1HSA

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks