General

  • Target

    404f79191335f423fdba02682c70ca47ea2530e6d5e00cf5ef3360a2462544eb

  • Size

    314KB

  • Sample

    221123-ke6t6acd3y

  • MD5

    fac34127cb1335315db4d69ad8b481d0

  • SHA1

    d56fa1832e76f9977c761a4e12c0e5feabcb803b

  • SHA256

    404f79191335f423fdba02682c70ca47ea2530e6d5e00cf5ef3360a2462544eb

  • SHA512

    df6ed1a1b35caef5d173b269d4e9c0694329f76a8f3b09cd79cad56a3e6cc7e9fa0af693507b0aa9d0d221168616e286340d0203bfbeeeb76f208ccc08e02825

  • SSDEEP

    6144:xrfbUzkuvcBYC47l2xMrJO/KNYtlENexAYl47LtOBxLTKgv:xrUkuveY3FVHNYt72gdv

Score
7/10

Malware Config

Targets

    • Target

      404f79191335f423fdba02682c70ca47ea2530e6d5e00cf5ef3360a2462544eb

    • Size

      314KB

    • MD5

      fac34127cb1335315db4d69ad8b481d0

    • SHA1

      d56fa1832e76f9977c761a4e12c0e5feabcb803b

    • SHA256

      404f79191335f423fdba02682c70ca47ea2530e6d5e00cf5ef3360a2462544eb

    • SHA512

      df6ed1a1b35caef5d173b269d4e9c0694329f76a8f3b09cd79cad56a3e6cc7e9fa0af693507b0aa9d0d221168616e286340d0203bfbeeeb76f208ccc08e02825

    • SSDEEP

      6144:xrfbUzkuvcBYC47l2xMrJO/KNYtlENexAYl47LtOBxLTKgv:xrUkuveY3FVHNYt72gdv

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks