General

  • Target

    adb4ad5f73e49e09f87033caa0f6f08edd279187d6d936c88708f548e2c6749f

  • Size

    313KB

  • Sample

    221123-jsegdsga24

  • MD5

    4e1bfa25676de9317d46c1dda6cd4f09

  • SHA1

    7ae6870833356390e52864cc46a85808fe36be4f

  • SHA256

    adb4ad5f73e49e09f87033caa0f6f08edd279187d6d936c88708f548e2c6749f

  • SHA512

    a54d5642303b08339389e2472378bd110cc87ad65de736e312fe53283ef5918b70c79803f3d50ea22a635ae23151a55240a8dfffb231fa2d4b10a35508915722

  • SSDEEP

    6144:MrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0L69:Mryu6/eIo4vMResyEf0uP9d9UG0A

Score
7/10

Malware Config

Targets

    • Target

      adb4ad5f73e49e09f87033caa0f6f08edd279187d6d936c88708f548e2c6749f

    • Size

      313KB

    • MD5

      4e1bfa25676de9317d46c1dda6cd4f09

    • SHA1

      7ae6870833356390e52864cc46a85808fe36be4f

    • SHA256

      adb4ad5f73e49e09f87033caa0f6f08edd279187d6d936c88708f548e2c6749f

    • SHA512

      a54d5642303b08339389e2472378bd110cc87ad65de736e312fe53283ef5918b70c79803f3d50ea22a635ae23151a55240a8dfffb231fa2d4b10a35508915722

    • SSDEEP

      6144:MrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0L69:Mryu6/eIo4vMResyEf0uP9d9UG0A

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks