General

  • Target

    2e75ff58708267314761e148e57322a41707e710d57c310f715c11b371168659

  • Size

    313KB

  • Sample

    221124-egq9laag4z

  • MD5

    c303754b714fc8584e1132c9d7546741

  • SHA1

    5de3610f4a7ae9fb3b2ab1ee2906978196a4afe6

  • SHA256

    2e75ff58708267314761e148e57322a41707e710d57c310f715c11b371168659

  • SHA512

    9babab2ae73b5d973a6ff31390cdf66cd99e9a267a11c591de93286e1934bf6aa2e3e31a506af2e61f3e9261a27baa940be7cc5e4d057f64eda06f639a300ada

  • SSDEEP

    6144:YrkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijY2:Yrk4u6/eIo4nlu7trxFtApfgMyrpjY2

Score
7/10

Malware Config

Targets

    • Target

      2e75ff58708267314761e148e57322a41707e710d57c310f715c11b371168659

    • Size

      313KB

    • MD5

      c303754b714fc8584e1132c9d7546741

    • SHA1

      5de3610f4a7ae9fb3b2ab1ee2906978196a4afe6

    • SHA256

      2e75ff58708267314761e148e57322a41707e710d57c310f715c11b371168659

    • SHA512

      9babab2ae73b5d973a6ff31390cdf66cd99e9a267a11c591de93286e1934bf6aa2e3e31a506af2e61f3e9261a27baa940be7cc5e4d057f64eda06f639a300ada

    • SSDEEP

      6144:YrkA9uEo2S1YnQmCX492DkwNP3qpYF0lu7tIYxFtApNhiYLE2/5yr3+LijY2:Yrk4u6/eIo4nlu7trxFtApfgMyrpjY2

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks