General

  • Target

    48bf725e1014b31ca5d65ae55433d37b1128d924cad67e7f2d05608ebf2d251e

  • Size

    327KB

  • Sample

    221123-kdts7sgh73

  • MD5

    9a83124e1a274b6b395f4cff7e7fd461

  • SHA1

    be285e5a4ef67b6140ceb0713d28d22b597a9667

  • SHA256

    48bf725e1014b31ca5d65ae55433d37b1128d924cad67e7f2d05608ebf2d251e

  • SHA512

    69d2bcc833a5cedf8061978750d185021aadc3d493fa1aeb922943fce192e412218d0f819dddaf2e034020568e637e540afeb19775b47e25c6f6bce5049bc885

  • SSDEEP

    6144:trVbUzkuvcBYC47l2xt81bM31jFryMm/+3pZasr0AtbgTtCybrNMco:trGkuveY38aExzr3pZh0d8EJ9o

Score
7/10

Malware Config

Targets

    • Target

      48bf725e1014b31ca5d65ae55433d37b1128d924cad67e7f2d05608ebf2d251e

    • Size

      327KB

    • MD5

      9a83124e1a274b6b395f4cff7e7fd461

    • SHA1

      be285e5a4ef67b6140ceb0713d28d22b597a9667

    • SHA256

      48bf725e1014b31ca5d65ae55433d37b1128d924cad67e7f2d05608ebf2d251e

    • SHA512

      69d2bcc833a5cedf8061978750d185021aadc3d493fa1aeb922943fce192e412218d0f819dddaf2e034020568e637e540afeb19775b47e25c6f6bce5049bc885

    • SSDEEP

      6144:trVbUzkuvcBYC47l2xt81bM31jFryMm/+3pZasr0AtbgTtCybrNMco:trGkuveY38aExzr3pZh0d8EJ9o

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks