General

  • Target

    a4f8dea68c30d9bd825c03d81726fb7a061c6ca58719c6220c05575b08ac5e1d

  • Size

    314KB

  • Sample

    221123-jvly9agb22

  • MD5

    d48f1a13a960fb6e7dcb2cc2266c3854

  • SHA1

    f33cf1689a1cfa5c0f891d23818e8c26b7986fae

  • SHA256

    a4f8dea68c30d9bd825c03d81726fb7a061c6ca58719c6220c05575b08ac5e1d

  • SHA512

    14bcfad9fbb47c6d5e3505a479e467648c5f0a2ce8be22ebcd870fd6c1ed1dc43697a67806817fcaff3f7ce40923e1b24babf3fc78be1b314f0b861b041af256

  • SSDEEP

    6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwR:Qr1kuveY35YO67Wxz7wR

Score
7/10

Malware Config

Targets

    • Target

      a4f8dea68c30d9bd825c03d81726fb7a061c6ca58719c6220c05575b08ac5e1d

    • Size

      314KB

    • MD5

      d48f1a13a960fb6e7dcb2cc2266c3854

    • SHA1

      f33cf1689a1cfa5c0f891d23818e8c26b7986fae

    • SHA256

      a4f8dea68c30d9bd825c03d81726fb7a061c6ca58719c6220c05575b08ac5e1d

    • SHA512

      14bcfad9fbb47c6d5e3505a479e467648c5f0a2ce8be22ebcd870fd6c1ed1dc43697a67806817fcaff3f7ce40923e1b24babf3fc78be1b314f0b861b041af256

    • SSDEEP

      6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwR:Qr1kuveY35YO67Wxz7wR

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks