General

  • Target

    2f4974a2c51bdc6b337ab569aedef566f1852c3c14110d47aea44c94a1b873a2

  • Size

    313KB

  • Sample

    221123-kh1gjshb46

  • MD5

    d64a5fc491feb43f3f2fea1121e5d7b3

  • SHA1

    661ac1b8736e2bf4145011aef31eeb1611a8213e

  • SHA256

    2f4974a2c51bdc6b337ab569aedef566f1852c3c14110d47aea44c94a1b873a2

  • SHA512

    282c30738bba35af2278c0b9b821c716b81df7df8f5f9b1f91a84b595395b38f5b3d84296333e62cd37d990efc88fe4d9f320e189da4c9e6d280d05f5e76c8d2

  • SSDEEP

    6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LZ:Hryu6/eIo4vMResyEf0uP9d9UG0Z

Score
7/10

Malware Config

Targets

    • Target

      2f4974a2c51bdc6b337ab569aedef566f1852c3c14110d47aea44c94a1b873a2

    • Size

      313KB

    • MD5

      d64a5fc491feb43f3f2fea1121e5d7b3

    • SHA1

      661ac1b8736e2bf4145011aef31eeb1611a8213e

    • SHA256

      2f4974a2c51bdc6b337ab569aedef566f1852c3c14110d47aea44c94a1b873a2

    • SHA512

      282c30738bba35af2278c0b9b821c716b81df7df8f5f9b1f91a84b595395b38f5b3d84296333e62cd37d990efc88fe4d9f320e189da4c9e6d280d05f5e76c8d2

    • SSDEEP

      6144:HrK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0LZ:Hryu6/eIo4vMResyEf0uP9d9UG0Z

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks