General

  • Target

    53794d6b1493d5fe5d6e8e2b6fe8b4c3b998540653dc47f64feb52729b4ecbdf

  • Size

    315KB

  • Sample

    221123-kb466agg97

  • MD5

    cb7a7be4b1aefa6751ba467c3c87b6fc

  • SHA1

    1779a3f06e44e7a9fb2b05a2ad38f492b0c84cad

  • SHA256

    53794d6b1493d5fe5d6e8e2b6fe8b4c3b998540653dc47f64feb52729b4ecbdf

  • SHA512

    ab1303b8be0af607a8333f587eb1ce286cf510c96e6853daa0f6e68a23dcec24fc24db2afb66ea2232549859f3b4c21a74607c81a3e84ce58a4b187f5ded9c18

  • SSDEEP

    6144:2r2bUzkuvcBYC47l2xib6HwzFyytCr88oDG1GI25i1snqq04:2r/kuveY3dGwUECr88oDG1GIS+bq04

Score
7/10

Malware Config

Targets

    • Target

      53794d6b1493d5fe5d6e8e2b6fe8b4c3b998540653dc47f64feb52729b4ecbdf

    • Size

      315KB

    • MD5

      cb7a7be4b1aefa6751ba467c3c87b6fc

    • SHA1

      1779a3f06e44e7a9fb2b05a2ad38f492b0c84cad

    • SHA256

      53794d6b1493d5fe5d6e8e2b6fe8b4c3b998540653dc47f64feb52729b4ecbdf

    • SHA512

      ab1303b8be0af607a8333f587eb1ce286cf510c96e6853daa0f6e68a23dcec24fc24db2afb66ea2232549859f3b4c21a74607c81a3e84ce58a4b187f5ded9c18

    • SSDEEP

      6144:2r2bUzkuvcBYC47l2xib6HwzFyytCr88oDG1GI25i1snqq04:2r/kuveY3dGwUECr88oDG1GIS+bq04

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks