General

  • Target

    40a09ca9f1177339cc1d0b43cec43abaf573b8151910f23921057d65d8965720

  • Size

    314KB

  • Sample

    221123-ke4psscd3w

  • MD5

    ef83d24c5a4981be2505595c5cf8131d

  • SHA1

    0df58699bbd5c82dea21a212dd185b3d2baa4e83

  • SHA256

    40a09ca9f1177339cc1d0b43cec43abaf573b8151910f23921057d65d8965720

  • SHA512

    a3deacc5d67eb9f7f20f410cd806e7372ac761dd9640e4ded7748d42c8ddaeb5e426fc18e8b146b7ece9d54955dc642bf27e868efc7026c9c22350fe537bb2ef

  • SSDEEP

    6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwf:Qr1kuveY35YO67Wxz7wf

Score
7/10

Malware Config

Targets

    • Target

      40a09ca9f1177339cc1d0b43cec43abaf573b8151910f23921057d65d8965720

    • Size

      314KB

    • MD5

      ef83d24c5a4981be2505595c5cf8131d

    • SHA1

      0df58699bbd5c82dea21a212dd185b3d2baa4e83

    • SHA256

      40a09ca9f1177339cc1d0b43cec43abaf573b8151910f23921057d65d8965720

    • SHA512

      a3deacc5d67eb9f7f20f410cd806e7372ac761dd9640e4ded7748d42c8ddaeb5e426fc18e8b146b7ece9d54955dc642bf27e868efc7026c9c22350fe537bb2ef

    • SSDEEP

      6144:QrAbUzkuvcBYC47l2xn88NEymFTYO67qzVxzRRwf:Qr1kuveY35YO67Wxz7wf

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks