General

  • Target

    9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58

  • Size

    313KB

  • Sample

    221123-jx7nqsgc24

  • MD5

    bcb7f11f81d842a3588abe800b54a2f9

  • SHA1

    a2efa9f08ecee2592cf73496dbc760e82c4dfaba

  • SHA256

    9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58

  • SHA512

    30caf57fa06ef728f3e14f733f7e1c155ce86da47e2c20f185c7fb6a5786e8cb9f6df7233cc6b6afacc06c4bb0d8a62a2571bf33bf5721792ef093eb28578552

  • SSDEEP

    6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzA:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5p

Score
7/10

Malware Config

Targets

    • Target

      9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58

    • Size

      313KB

    • MD5

      bcb7f11f81d842a3588abe800b54a2f9

    • SHA1

      a2efa9f08ecee2592cf73496dbc760e82c4dfaba

    • SHA256

      9777874f5aa4f3b1bc3a9337b0fb136b35d63d5c6cbfd01d7aa30b2c0c6f1c58

    • SHA512

      30caf57fa06ef728f3e14f733f7e1c155ce86da47e2c20f185c7fb6a5786e8cb9f6df7233cc6b6afacc06c4bb0d8a62a2571bf33bf5721792ef093eb28578552

    • SSDEEP

      6144:0rJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUzA:0rfu6/eIo4XwlWKM231t5UnRr3DdRp5p

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks