General

  • Target

    abaaca7c9ba1ec1c628acd3dd68363e538e5a7303b284c772ad102c19279af43

  • Size

    314KB

  • Sample

    221123-js9mjaga54

  • MD5

    9fe0665b2867b39fde52a30c33922686

  • SHA1

    daa63541a1b23f7d67beb14f3f2dab47e756734e

  • SHA256

    abaaca7c9ba1ec1c628acd3dd68363e538e5a7303b284c772ad102c19279af43

  • SHA512

    714d3c6db70e148e91623404f8df0653446bec1113d891a5b822a6131ff77038af0c7ac8929f93d02474fd396dc84b37f55fcb8538e79f6ebddfd05cf9b92e13

  • SSDEEP

    6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwt:Qr1kuveY35YO67Wxz7wt

Score
7/10

Malware Config

Targets

    • Target

      abaaca7c9ba1ec1c628acd3dd68363e538e5a7303b284c772ad102c19279af43

    • Size

      314KB

    • MD5

      9fe0665b2867b39fde52a30c33922686

    • SHA1

      daa63541a1b23f7d67beb14f3f2dab47e756734e

    • SHA256

      abaaca7c9ba1ec1c628acd3dd68363e538e5a7303b284c772ad102c19279af43

    • SHA512

      714d3c6db70e148e91623404f8df0653446bec1113d891a5b822a6131ff77038af0c7ac8929f93d02474fd396dc84b37f55fcb8538e79f6ebddfd05cf9b92e13

    • SSDEEP

      6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwt:Qr1kuveY35YO67Wxz7wt

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks