General

  • Target

    401b14d3d983e001312d88a3bd71311e51e8722e1969c7bfdae1bf0372038d1f

  • Size

    313KB

  • Sample

    221123-ke8nraha37

  • MD5

    bfcd4c2b3ae668c7e853413d5a3ca978

  • SHA1

    d837b003433bbfa6b54e83710b60deb44bc725b6

  • SHA256

    401b14d3d983e001312d88a3bd71311e51e8722e1969c7bfdae1bf0372038d1f

  • SHA512

    1ee8b1b94d9c6644e6ff8714eb7a7ed384ff86f1a213a4cb1006f577f3568df68b3819c779594684c2786b785638ec905b3713a1a73f1cb74b04ad583b4cfe99

  • SSDEEP

    6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYr:Ark4u6/eIo4nlu7trxFtApfgMyrpjYr

Score
7/10

Malware Config

Targets

    • Target

      401b14d3d983e001312d88a3bd71311e51e8722e1969c7bfdae1bf0372038d1f

    • Size

      313KB

    • MD5

      bfcd4c2b3ae668c7e853413d5a3ca978

    • SHA1

      d837b003433bbfa6b54e83710b60deb44bc725b6

    • SHA256

      401b14d3d983e001312d88a3bd71311e51e8722e1969c7bfdae1bf0372038d1f

    • SHA512

      1ee8b1b94d9c6644e6ff8714eb7a7ed384ff86f1a213a4cb1006f577f3568df68b3819c779594684c2786b785638ec905b3713a1a73f1cb74b04ad583b4cfe99

    • SSDEEP

      6144:ArkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijYr:Ark4u6/eIo4nlu7trxFtApfgMyrpjYr

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks