General

  • Target

    a8f9a862910d7ae94a6dbcfd457256d989dc2d8dec76f9d2dcfea1f5be9292cb

  • Size

    327KB

  • Sample

    221123-jttygaga73

  • MD5

    f14fd6a0aed92e9add63fea18e622272

  • SHA1

    fd85241c46681dd132d23dd0f0aa5bbf64ba8624

  • SHA256

    a8f9a862910d7ae94a6dbcfd457256d989dc2d8dec76f9d2dcfea1f5be9292cb

  • SHA512

    2dcaf1f63d8fa9ec88bde9f06626cb7d979581bc7c6027d5d1b6678c13108fa0e9eae84ae6c4f15e3148549a87910c560e64eb50b156c9762f11bc93495f9826

  • SSDEEP

    6144:Br469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6Fs:Br4iu6/eIo4Rsw33AtsmQN

Score
7/10

Malware Config

Targets

    • Target

      a8f9a862910d7ae94a6dbcfd457256d989dc2d8dec76f9d2dcfea1f5be9292cb

    • Size

      327KB

    • MD5

      f14fd6a0aed92e9add63fea18e622272

    • SHA1

      fd85241c46681dd132d23dd0f0aa5bbf64ba8624

    • SHA256

      a8f9a862910d7ae94a6dbcfd457256d989dc2d8dec76f9d2dcfea1f5be9292cb

    • SHA512

      2dcaf1f63d8fa9ec88bde9f06626cb7d979581bc7c6027d5d1b6678c13108fa0e9eae84ae6c4f15e3148549a87910c560e64eb50b156c9762f11bc93495f9826

    • SSDEEP

      6144:Br469uEo2S1YnQmCX492DkwNP3qpYFGgjwuBGVdLAt4ZHd2i3gjd+ZD/6Fs:Br4iu6/eIo4Rsw33AtsmQN

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks