General

  • Target

    f3d7d24817439dca144709c661d3be5184d10e17c05275d3f3ca805b45cdff74

  • Size

    318KB

  • Sample

    221123-ktbbsshe93

  • MD5

    b413160bc6a42b53ff0db7f88d5bd5c1

  • SHA1

    cf7b414eba21383bac5a017860e49dac3723178d

  • SHA256

    f3d7d24817439dca144709c661d3be5184d10e17c05275d3f3ca805b45cdff74

  • SHA512

    915d66e041e47c3f4c90c32c96649bf85363230e4d809a53d50b388379df6e24f96550e739ff4312c3df1e1da2ba8b7c15b361e012f8054238c0d77b04d030af

  • SSDEEP

    6144:sr449uEo2S1YnQmCX492DkwNP3qpYFU/ULKRKuz0jB4Ptagah2Q+U:sr4Qu6/eIo4QKguz0jKP0gah2Qr

Score
7/10

Malware Config

Targets

    • Target

      f3d7d24817439dca144709c661d3be5184d10e17c05275d3f3ca805b45cdff74

    • Size

      318KB

    • MD5

      b413160bc6a42b53ff0db7f88d5bd5c1

    • SHA1

      cf7b414eba21383bac5a017860e49dac3723178d

    • SHA256

      f3d7d24817439dca144709c661d3be5184d10e17c05275d3f3ca805b45cdff74

    • SHA512

      915d66e041e47c3f4c90c32c96649bf85363230e4d809a53d50b388379df6e24f96550e739ff4312c3df1e1da2ba8b7c15b361e012f8054238c0d77b04d030af

    • SSDEEP

      6144:sr449uEo2S1YnQmCX492DkwNP3qpYFU/ULKRKuz0jB4Ptagah2Q+U:sr4Qu6/eIo4QKguz0jKP0gah2Qr

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks