General

  • Target

    933b29b1fcf41e1c7512e43eb1432aaca70f72df2941a0f27afa836504fcbf55

  • Size

    313KB

  • Sample

    221123-jyswzabe9v

  • MD5

    e04d8617521971613ad631f82ed45066

  • SHA1

    b745e91a3a9976c446b499df718a81acc3fe2afb

  • SHA256

    933b29b1fcf41e1c7512e43eb1432aaca70f72df2941a0f27afa836504fcbf55

  • SHA512

    36a37aed9af1df7bbef43bbde0adc7f7b7e16fd4f5da76ae29e32b36e5e4490980282db72f0de4e0d0c44499d89c10632291492e67af6479f5bd733d35255ea4

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYz:Ark4u6/eIo4nlu7trxFtApfgMyrpjYz

Score
7/10

Malware Config

Targets

    • Target

      933b29b1fcf41e1c7512e43eb1432aaca70f72df2941a0f27afa836504fcbf55

    • Size

      313KB

    • MD5

      e04d8617521971613ad631f82ed45066

    • SHA1

      b745e91a3a9976c446b499df718a81acc3fe2afb

    • SHA256

      933b29b1fcf41e1c7512e43eb1432aaca70f72df2941a0f27afa836504fcbf55

    • SHA512

      36a37aed9af1df7bbef43bbde0adc7f7b7e16fd4f5da76ae29e32b36e5e4490980282db72f0de4e0d0c44499d89c10632291492e67af6479f5bd733d35255ea4

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYz:Ark4u6/eIo4nlu7trxFtApfgMyrpjYz

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks