General

  • Target

    b12761c4b9634fe96d419b21a7e9aa5d7c4184fb3515cde79355a2dbdbf06da0

  • Size

    313KB

  • Sample

    221123-jqrnyafh58

  • MD5

    5e80d2e0b831f2fbfaed16a349f04415

  • SHA1

    8607177d4af39bd113053ac0b06b297a9ff27b5c

  • SHA256

    b12761c4b9634fe96d419b21a7e9aa5d7c4184fb3515cde79355a2dbdbf06da0

  • SHA512

    5a1fd145fe7cdfd2ac769c94e0e9a43e2c8f9b2d46987e77eac08f83f6f913614970cd562cbf65ecebb94f52cc77d0f4fd3feb20872db50980c6c39dbddc4fe1

  • SSDEEP

    6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzB:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5s

Score
7/10

Malware Config

Targets

    • Target

      b12761c4b9634fe96d419b21a7e9aa5d7c4184fb3515cde79355a2dbdbf06da0

    • Size

      313KB

    • MD5

      5e80d2e0b831f2fbfaed16a349f04415

    • SHA1

      8607177d4af39bd113053ac0b06b297a9ff27b5c

    • SHA256

      b12761c4b9634fe96d419b21a7e9aa5d7c4184fb3515cde79355a2dbdbf06da0

    • SHA512

      5a1fd145fe7cdfd2ac769c94e0e9a43e2c8f9b2d46987e77eac08f83f6f913614970cd562cbf65ecebb94f52cc77d0f4fd3feb20872db50980c6c39dbddc4fe1

    • SSDEEP

      6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzB:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5s

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks