General

  • Target

    ad0f30d7e605a1db8101e508398b1e39685a1bc116b840c078c161474b46d24e

  • Size

    313KB

  • Sample

    221123-jsky6sga33

  • MD5

    09e2461c1a6f40dad893989b02d6e9d4

  • SHA1

    5f2e3594e1da62d23613d3b679252617bba30311

  • SHA256

    ad0f30d7e605a1db8101e508398b1e39685a1bc116b840c078c161474b46d24e

  • SHA512

    e8843f4a26bb3056b388b5fec3b6b223d2fb49e8505dd9130963f8e55b491deaf0882699ab087c07cb2688c40da7cfdf7e9df7060eb8a0a4409e9189f3593bbf

  • SSDEEP

    6144:4rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYn:4rk4u6/eIo4nlu7trxFtApfgMyrpjYn

Score
7/10

Malware Config

Targets

    • Target

      ad0f30d7e605a1db8101e508398b1e39685a1bc116b840c078c161474b46d24e

    • Size

      313KB

    • MD5

      09e2461c1a6f40dad893989b02d6e9d4

    • SHA1

      5f2e3594e1da62d23613d3b679252617bba30311

    • SHA256

      ad0f30d7e605a1db8101e508398b1e39685a1bc116b840c078c161474b46d24e

    • SHA512

      e8843f4a26bb3056b388b5fec3b6b223d2fb49e8505dd9130963f8e55b491deaf0882699ab087c07cb2688c40da7cfdf7e9df7060eb8a0a4409e9189f3593bbf

    • SSDEEP

      6144:4rkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYn:4rk4u6/eIo4nlu7trxFtApfgMyrpjYn

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks