General

  • Target

    4d7f406289224976b690a6887811a6387f4e81aecb49a4adfb376d6c1331da06

  • Size

    322KB

  • Sample

    221123-kcz9lagh42

  • MD5

    d5b05f37391b683b17f1735482340daf

  • SHA1

    9c9b6326662e2e3393f2ffbc54222e8b2ae344fa

  • SHA256

    4d7f406289224976b690a6887811a6387f4e81aecb49a4adfb376d6c1331da06

  • SHA512

    28a41edff5e650c3e0c43c2a0b544a2beb8f510f9b9f226543f5830ea31623b1d14748c8eb58cba76035472041bfcfef95d150bc8ba920236e755fe7eef2c3de

  • SSDEEP

    6144:ArV49uEo2S1YnQmCX492DkwNP3qpYFkKQdF8lgywXW/XK11AVBZ5jhqUnm8xcR:ArVQu6/eIo4qQdF8lEeXK11AZDqUmpR

Score
7/10

Malware Config

Targets

    • Target

      4d7f406289224976b690a6887811a6387f4e81aecb49a4adfb376d6c1331da06

    • Size

      322KB

    • MD5

      d5b05f37391b683b17f1735482340daf

    • SHA1

      9c9b6326662e2e3393f2ffbc54222e8b2ae344fa

    • SHA256

      4d7f406289224976b690a6887811a6387f4e81aecb49a4adfb376d6c1331da06

    • SHA512

      28a41edff5e650c3e0c43c2a0b544a2beb8f510f9b9f226543f5830ea31623b1d14748c8eb58cba76035472041bfcfef95d150bc8ba920236e755fe7eef2c3de

    • SSDEEP

      6144:ArV49uEo2S1YnQmCX492DkwNP3qpYFkKQdF8lgywXW/XK11AVBZ5jhqUnm8xcR:ArVQu6/eIo4qQdF8lEeXK11AZDqUmpR

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks