General

  • Target

    389d5b469e13fd34a2202eb296ee0c1781a9e09fd1c1b332a3ee908c92153e91

  • Size

    334KB

  • Sample

    221123-kf9bnscd7x

  • MD5

    f985b9b5bb048fdfca414021c1316b49

  • SHA1

    69e27956eb332b198d74693dcc09443ef69433e4

  • SHA256

    389d5b469e13fd34a2202eb296ee0c1781a9e09fd1c1b332a3ee908c92153e91

  • SHA512

    bb1fa2d076d43adab6ca878dcf3a2a0744078ee03b22ca3c1566a1b1587d970ebd59669f587a0a42e4a2a2fd2b4f9d46f7a5dd4b4719707a91debbb13ab45850

  • SSDEEP

    6144:5rv3cAbUzkuvcBYC47l2xDT2ktvFSNCOwe7KcN90pEWe6dGcsX74mzPa:5rv3c1kuveY3OT2ktvFSZw20pLnsjba

Score
7/10

Malware Config

Targets

    • Target

      389d5b469e13fd34a2202eb296ee0c1781a9e09fd1c1b332a3ee908c92153e91

    • Size

      334KB

    • MD5

      f985b9b5bb048fdfca414021c1316b49

    • SHA1

      69e27956eb332b198d74693dcc09443ef69433e4

    • SHA256

      389d5b469e13fd34a2202eb296ee0c1781a9e09fd1c1b332a3ee908c92153e91

    • SHA512

      bb1fa2d076d43adab6ca878dcf3a2a0744078ee03b22ca3c1566a1b1587d970ebd59669f587a0a42e4a2a2fd2b4f9d46f7a5dd4b4719707a91debbb13ab45850

    • SSDEEP

      6144:5rv3cAbUzkuvcBYC47l2xDT2ktvFSNCOwe7KcN90pEWe6dGcsX74mzPa:5rv3c1kuveY3OT2ktvFSZw20pLnsjba

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks