General

  • Target

    8d56a3c5f3b015ffeb38838a90d84842222a11b25df647901b26c1de64ec8751

  • Size

    313KB

  • Sample

    221123-jzt6esgc69

  • MD5

    ac68bf4a1b42f1c5983e2bcbd8def6c0

  • SHA1

    3ea78b065d3824299dc34746bfe390cde8e7c2bd

  • SHA256

    8d56a3c5f3b015ffeb38838a90d84842222a11b25df647901b26c1de64ec8751

  • SHA512

    d0023f6a075e9e991cafd21f40a1de090330614f9c7f6acab9f7c1b8e2de35ad12ab60ce5ca8f6468e341d5772441fa0eb8c2c518fd78de68034b9df1cf0623f

  • SSDEEP

    6144:IrJ9uEo2S1YnQmCX492DkwNP3qpYFQiY0Z56GICaNRCVEumbcF6ov5d889PgLVDO:Irfu6/eIo4jVW5soVCcQovoO0DJM+E9

Score
7/10

Malware Config

Targets

    • Target

      8d56a3c5f3b015ffeb38838a90d84842222a11b25df647901b26c1de64ec8751

    • Size

      313KB

    • MD5

      ac68bf4a1b42f1c5983e2bcbd8def6c0

    • SHA1

      3ea78b065d3824299dc34746bfe390cde8e7c2bd

    • SHA256

      8d56a3c5f3b015ffeb38838a90d84842222a11b25df647901b26c1de64ec8751

    • SHA512

      d0023f6a075e9e991cafd21f40a1de090330614f9c7f6acab9f7c1b8e2de35ad12ab60ce5ca8f6468e341d5772441fa0eb8c2c518fd78de68034b9df1cf0623f

    • SSDEEP

      6144:IrJ9uEo2S1YnQmCX492DkwNP3qpYFQiY0Z56GICaNRCVEumbcF6ov5d889PgLVDO:Irfu6/eIo4jVW5soVCcQovoO0DJM+E9

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks