General

  • Target

    3e8b260ca4598bc1826233569626a583ced4383d2360265574fb0864eac64a12

  • Size

    313KB

  • Sample

    221123-kfd6jacd5v

  • MD5

    a2fbda3cb7a65a46f2e65df99dc03814

  • SHA1

    ef82dddd2a7d0834f175b5ed6254bb1bc0069ea5

  • SHA256

    3e8b260ca4598bc1826233569626a583ced4383d2360265574fb0864eac64a12

  • SHA512

    3da59b38c9e0903402340d32ea5e64784d50eeb3ccdbf711ebc72e3b4fc65f231a11bef511c09cd8dfc862b889409000adeea8c8ab67c55171be0a415279156f

  • SSDEEP

    6144:4rJ9uEo2S1YnQmCX492DkwNP3qpYFQiY0Z56GICaNRCVEumbcF6ov5d889PgLVD3:4rfu6/eIo4jVW5soVCcQovoO0DJM+Es

Score
7/10

Malware Config

Targets

    • Target

      3e8b260ca4598bc1826233569626a583ced4383d2360265574fb0864eac64a12

    • Size

      313KB

    • MD5

      a2fbda3cb7a65a46f2e65df99dc03814

    • SHA1

      ef82dddd2a7d0834f175b5ed6254bb1bc0069ea5

    • SHA256

      3e8b260ca4598bc1826233569626a583ced4383d2360265574fb0864eac64a12

    • SHA512

      3da59b38c9e0903402340d32ea5e64784d50eeb3ccdbf711ebc72e3b4fc65f231a11bef511c09cd8dfc862b889409000adeea8c8ab67c55171be0a415279156f

    • SSDEEP

      6144:4rJ9uEo2S1YnQmCX492DkwNP3qpYFQiY0Z56GICaNRCVEumbcF6ov5d889PgLVD3:4rfu6/eIo4jVW5soVCcQovoO0DJM+Es

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks