General

  • Target

    5a244a3fd18f618d114c2a10dfe7a1f14e203395f532e488e6ded007b8cb483d

  • Size

    314KB

  • Sample

    221123-kax2fsgg53

  • MD5

    e09d43a5b135ac10fbed66b87dff8378

  • SHA1

    9412b7f307de40d9f7c55f6f1c4f6c6fd7144929

  • SHA256

    5a244a3fd18f618d114c2a10dfe7a1f14e203395f532e488e6ded007b8cb483d

  • SHA512

    8234e586b8e7c169b4de21356f78f68811f3e2a5da5b335ee30c2646c5d80df14d7ddf4995efcbe2244d60260d3441bd0217470517795f7eb1c2aa632c56db73

  • SSDEEP

    6144:IrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwA:Ir1kuveY35YO67Wxz7wA

Score
7/10

Malware Config

Targets

    • Target

      5a244a3fd18f618d114c2a10dfe7a1f14e203395f532e488e6ded007b8cb483d

    • Size

      314KB

    • MD5

      e09d43a5b135ac10fbed66b87dff8378

    • SHA1

      9412b7f307de40d9f7c55f6f1c4f6c6fd7144929

    • SHA256

      5a244a3fd18f618d114c2a10dfe7a1f14e203395f532e488e6ded007b8cb483d

    • SHA512

      8234e586b8e7c169b4de21356f78f68811f3e2a5da5b335ee30c2646c5d80df14d7ddf4995efcbe2244d60260d3441bd0217470517795f7eb1c2aa632c56db73

    • SSDEEP

      6144:IrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwA:Ir1kuveY35YO67Wxz7wA

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks