General

  • Target

    384ea9d0bcb221a5e9fc67e628d7bc1db42415dffe5233aca9a22801562f4fb6

  • Size

    322KB

  • Sample

    221123-kgavhaha73

  • MD5

    b34fb18eef76948387a5e53d2c61bc6a

  • SHA1

    2c89e4c9e71af6cd21ce7feec019d581e3b4522a

  • SHA256

    384ea9d0bcb221a5e9fc67e628d7bc1db42415dffe5233aca9a22801562f4fb6

  • SHA512

    04a8401f49d270b1406b7f9aa5377eaa748e3be835ed85b3e12e5f49b68a4430a77a705b193e010d5e42dbaa0a88e7576b0d537013cf6e88dcc43bd47ce7a1f3

  • SSDEEP

    6144:orV49uEo2S1YnQmCX492DkwNP3qpYFkKQdF8lgywXW/XK11AVBZ5jhqUnm8xcb:orVQu6/eIo4qQdF8lEeXK11AZDqUmpb

Score
7/10

Malware Config

Targets

    • Target

      384ea9d0bcb221a5e9fc67e628d7bc1db42415dffe5233aca9a22801562f4fb6

    • Size

      322KB

    • MD5

      b34fb18eef76948387a5e53d2c61bc6a

    • SHA1

      2c89e4c9e71af6cd21ce7feec019d581e3b4522a

    • SHA256

      384ea9d0bcb221a5e9fc67e628d7bc1db42415dffe5233aca9a22801562f4fb6

    • SHA512

      04a8401f49d270b1406b7f9aa5377eaa748e3be835ed85b3e12e5f49b68a4430a77a705b193e010d5e42dbaa0a88e7576b0d537013cf6e88dcc43bd47ce7a1f3

    • SSDEEP

      6144:orV49uEo2S1YnQmCX492DkwNP3qpYFkKQdF8lgywXW/XK11AVBZ5jhqUnm8xcb:orVQu6/eIo4qQdF8lEeXK11AZDqUmpb

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks