General

  • Target

    865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f

  • Size

    44KB

  • Sample

    221123-q28j6aae6y

  • MD5

    7c3c70263a72dca219905eaa13fb17be

  • SHA1

    4756592ef37a2209985e7708a79d69ca430a58b5

  • SHA256

    865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f

  • SHA512

    c87215373e5c68757c713892cd3860ccc8464d0b5d7733c46e4e3cef2db0faa51931a581b7b220c3f72a7b1ddda091d424e34fb14057f1207b97abdc99cfa6f5

  • SSDEEP

    768:Wajf3OJMzNp5p3hs0qLVwRO/YAtGxmPPmHnad3u9gDl:Bjf3O4txrq5w+t+6d3vl

Score
8/10

Malware Config

Targets

    • Target

      865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f

    • Size

      44KB

    • MD5

      7c3c70263a72dca219905eaa13fb17be

    • SHA1

      4756592ef37a2209985e7708a79d69ca430a58b5

    • SHA256

      865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f

    • SHA512

      c87215373e5c68757c713892cd3860ccc8464d0b5d7733c46e4e3cef2db0faa51931a581b7b220c3f72a7b1ddda091d424e34fb14057f1207b97abdc99cfa6f5

    • SSDEEP

      768:Wajf3OJMzNp5p3hs0qLVwRO/YAtGxmPPmHnad3u9gDl:Bjf3O4txrq5w+t+6d3vl

    Score
    8/10
    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks