General

  • Target

    5b817285b89edc06841173498df0f0f66799181d329f003307cec687940fef0c

  • Size

    314KB

  • Sample

    221123-kamkqagg39

  • MD5

    9936acf5cdcc5bfe358fdfaa686b6d18

  • SHA1

    d5db0bb7b3afb0bdfb1047ab4d47433acad18021

  • SHA256

    5b817285b89edc06841173498df0f0f66799181d329f003307cec687940fef0c

  • SHA512

    49a6d7e357f17ee4aa447b7e9a19168c97df4123d3a1fa3c78a8b09865db5bd96cb81741d07ad43cf532ac024a61da4a075ababd3508e58fba63a27d659416e4

  • SSDEEP

    6144:orAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwU:or1kuveY35YO67Wxz7wU

Score
7/10

Malware Config

Targets

    • Target

      5b817285b89edc06841173498df0f0f66799181d329f003307cec687940fef0c

    • Size

      314KB

    • MD5

      9936acf5cdcc5bfe358fdfaa686b6d18

    • SHA1

      d5db0bb7b3afb0bdfb1047ab4d47433acad18021

    • SHA256

      5b817285b89edc06841173498df0f0f66799181d329f003307cec687940fef0c

    • SHA512

      49a6d7e357f17ee4aa447b7e9a19168c97df4123d3a1fa3c78a8b09865db5bd96cb81741d07ad43cf532ac024a61da4a075ababd3508e58fba63a27d659416e4

    • SSDEEP

      6144:orAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwU:or1kuveY35YO67Wxz7wU

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks