General

  • Target

    8c36d0a2c4887f4289726d59f54567d2038739bc56580f52bea6c4b0cdee786b

  • Size

    313KB

  • Sample

    221123-jz5bdsgc79

  • MD5

    9e423973ced0831389a8da2d6a6102dd

  • SHA1

    291428e46bc2e79d588596a323bd0358914be9ef

  • SHA256

    8c36d0a2c4887f4289726d59f54567d2038739bc56580f52bea6c4b0cdee786b

  • SHA512

    e8ea675fdd3f8d4f6fcb2047207222a86d819cc436fbbbba0b33a1c273559c6ba1c769dcf0c01874df0eb836b68a2019a1952c8ecc65b39ff43f75951d7069b7

  • SSDEEP

    6144:YrkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYU:Yrk4u6/eIo4nlu7trxFtApfgMyrpjYU

Score
7/10

Malware Config

Targets

    • Target

      8c36d0a2c4887f4289726d59f54567d2038739bc56580f52bea6c4b0cdee786b

    • Size

      313KB

    • MD5

      9e423973ced0831389a8da2d6a6102dd

    • SHA1

      291428e46bc2e79d588596a323bd0358914be9ef

    • SHA256

      8c36d0a2c4887f4289726d59f54567d2038739bc56580f52bea6c4b0cdee786b

    • SHA512

      e8ea675fdd3f8d4f6fcb2047207222a86d819cc436fbbbba0b33a1c273559c6ba1c769dcf0c01874df0eb836b68a2019a1952c8ecc65b39ff43f75951d7069b7

    • SSDEEP

      6144:YrkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYU:Yrk4u6/eIo4nlu7trxFtApfgMyrpjYU

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks