General

  • Target

    33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498

  • Size

    202KB

  • Sample

    221123-rzmqcach4s

  • MD5

    9607d238fdefe44f890bf61b744f4b5c

  • SHA1

    eacff2409e64f12e87ae3a338732c0439c15e9b6

  • SHA256

    33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498

  • SHA512

    0cd043e6da5fa3a27a8095211bf6a2ec021c3b140ec0a257243b7e110b2d6ef9c72b1eaab1902dce9aec740a0397ecc7b230e5f1dfaf1f611c168c8a715d4a0c

  • SSDEEP

    3072:tUKWZa5ITmeyPCMdH2AY0M9KnglCnX4+TKqwZ68wLssdJToc:2bM5UmJddSKnglQo+Ti68Gssdd

Score
6/10

Malware Config

Targets

    • Target

      33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498

    • Size

      202KB

    • MD5

      9607d238fdefe44f890bf61b744f4b5c

    • SHA1

      eacff2409e64f12e87ae3a338732c0439c15e9b6

    • SHA256

      33a72fd7bb02e5001e14c71a7c4dc96d06a6b2f2d136efb391863539830fb498

    • SHA512

      0cd043e6da5fa3a27a8095211bf6a2ec021c3b140ec0a257243b7e110b2d6ef9c72b1eaab1902dce9aec740a0397ecc7b230e5f1dfaf1f611c168c8a715d4a0c

    • SSDEEP

      3072:tUKWZa5ITmeyPCMdH2AY0M9KnglCnX4+TKqwZ68wLssdJToc:2bM5UmJddSKnglQo+Ti68Gssdd

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks