General

  • Target

    b223acb90770148dc7568c7559ed950481d183d4bbf9cfecc905e43a8c6e9be1

  • Size

    313KB

  • Sample

    221123-jqdr3sfh52

  • MD5

    6950af3b44e8f2eb65e65a0b1db74cce

  • SHA1

    12c9e013ab033b5163289abc115354afb19ec0f8

  • SHA256

    b223acb90770148dc7568c7559ed950481d183d4bbf9cfecc905e43a8c6e9be1

  • SHA512

    8fca185a1225aa726f269d2e78f7adc814ab095fc54015b351d788acfa266ee28b89680c651f20b53c1d3e6cd04fc7f6bfe607983d51f9fc3fdbb1b27a2aafc3

  • SSDEEP

    6144:KrkP9uEo2S1YnQmCX492DkwNP3qpYFpdteedaMtBxOWUevASojincBS8:KrkFu6/eIo4mdt2M/lUevAzicH

Score
7/10

Malware Config

Targets

    • Target

      b223acb90770148dc7568c7559ed950481d183d4bbf9cfecc905e43a8c6e9be1

    • Size

      313KB

    • MD5

      6950af3b44e8f2eb65e65a0b1db74cce

    • SHA1

      12c9e013ab033b5163289abc115354afb19ec0f8

    • SHA256

      b223acb90770148dc7568c7559ed950481d183d4bbf9cfecc905e43a8c6e9be1

    • SHA512

      8fca185a1225aa726f269d2e78f7adc814ab095fc54015b351d788acfa266ee28b89680c651f20b53c1d3e6cd04fc7f6bfe607983d51f9fc3fdbb1b27a2aafc3

    • SSDEEP

      6144:KrkP9uEo2S1YnQmCX492DkwNP3qpYFpdteedaMtBxOWUevASojincBS8:KrkFu6/eIo4mdt2M/lUevAzicH

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks