General

  • Target

    57b4f1a748d9fdd312653b030641d776ab0bab101b03806c2e2744012b7c3880

  • Size

    316KB

  • Sample

    221123-kbddfagg72

  • MD5

    d81238a33999d4f4c4e312799d707f9c

  • SHA1

    49b00bc36bdaa5e1b82d15114fb24abdfd2079cf

  • SHA256

    57b4f1a748d9fdd312653b030641d776ab0bab101b03806c2e2744012b7c3880

  • SHA512

    94a4faaac6d05dca8924edcff9c40f9642656d9b4c9500a82297a56d51e72193aacd1adbb2e6d595efcdab7d45700413fb5ee1813dcc325499dd5ea02e710470

  • SSDEEP

    6144:Rr9bUzkuvcBYC47l2xA0CLzrfn5Agvirxi/NRFBDArU:Rr+kuveY3hdLzrfn5A1KtB/

Score
7/10

Malware Config

Targets

    • Target

      57b4f1a748d9fdd312653b030641d776ab0bab101b03806c2e2744012b7c3880

    • Size

      316KB

    • MD5

      d81238a33999d4f4c4e312799d707f9c

    • SHA1

      49b00bc36bdaa5e1b82d15114fb24abdfd2079cf

    • SHA256

      57b4f1a748d9fdd312653b030641d776ab0bab101b03806c2e2744012b7c3880

    • SHA512

      94a4faaac6d05dca8924edcff9c40f9642656d9b4c9500a82297a56d51e72193aacd1adbb2e6d595efcdab7d45700413fb5ee1813dcc325499dd5ea02e710470

    • SSDEEP

      6144:Rr9bUzkuvcBYC47l2xA0CLzrfn5Agvirxi/NRFBDArU:Rr+kuveY3hdLzrfn5A1KtB/

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks