General

  • Target

    2f5bd6a0f627ec4e69b8eb962fd474933e49f467d7931b18eb798936bc2c68ba

  • Size

    325KB

  • Sample

    221124-egln4sfe95

  • MD5

    b5fa6a4246e4cf5f5129bbedc526c016

  • SHA1

    5c62e8fcab9ed5f164a11de91ead76755ccc5b07

  • SHA256

    2f5bd6a0f627ec4e69b8eb962fd474933e49f467d7931b18eb798936bc2c68ba

  • SHA512

    f085b0469ec79e2e15c42ebe54abe3b70c1a1487d346350d6ba881daba8af878d1323ddc929926c795c9ba64858eebef57684e79b4a4db1ac65745abeb5f5a3c

  • SSDEEP

    6144:cr1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oh:cr1B3u6/eIo4ArVUBQCCYOqmO5oh

Score
7/10

Malware Config

Targets

    • Target

      2f5bd6a0f627ec4e69b8eb962fd474933e49f467d7931b18eb798936bc2c68ba

    • Size

      325KB

    • MD5

      b5fa6a4246e4cf5f5129bbedc526c016

    • SHA1

      5c62e8fcab9ed5f164a11de91ead76755ccc5b07

    • SHA256

      2f5bd6a0f627ec4e69b8eb962fd474933e49f467d7931b18eb798936bc2c68ba

    • SHA512

      f085b0469ec79e2e15c42ebe54abe3b70c1a1487d346350d6ba881daba8af878d1323ddc929926c795c9ba64858eebef57684e79b4a4db1ac65745abeb5f5a3c

    • SSDEEP

      6144:cr1Bh9uEo2S1YnQmCX492DkwNP3qpYFDcYgQUskKWeFCEQOiCYOqmO5oh:cr1B3u6/eIo4ArVUBQCCYOqmO5oh

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks