General

  • Target

    ac19eaf8101337a41e4ec3d00b565b0c4451cc25a1b70381b2bf09804a880fe6

  • Size

    304KB

  • Sample

    221124-ent9tsbc6x

  • MD5

    14085e61318c3dba27e8876aea12b5f0

  • SHA1

    990daf94c2050839059fd7596a8b05dc32625791

  • SHA256

    ac19eaf8101337a41e4ec3d00b565b0c4451cc25a1b70381b2bf09804a880fe6

  • SHA512

    b257c2abb98ebfe710537c452ebdcca2a3faa6b1bfd569590c3d15150318d0e458ba12fcf16a26d7d528ad22fbd92a8db1a595686b741fd096b8db02fa345d1b

  • SSDEEP

    6144:lrkW9uEo2S1YnQmCX492DkwNP3qpYF4AqqWb+qR9h+uqkNfoM6YV5TmNa1a3SyPy:lrkuu6/eIo4tQW62T+uTwM6YVxm24y

Score
7/10

Malware Config

Targets

    • Target

      ac19eaf8101337a41e4ec3d00b565b0c4451cc25a1b70381b2bf09804a880fe6

    • Size

      304KB

    • MD5

      14085e61318c3dba27e8876aea12b5f0

    • SHA1

      990daf94c2050839059fd7596a8b05dc32625791

    • SHA256

      ac19eaf8101337a41e4ec3d00b565b0c4451cc25a1b70381b2bf09804a880fe6

    • SHA512

      b257c2abb98ebfe710537c452ebdcca2a3faa6b1bfd569590c3d15150318d0e458ba12fcf16a26d7d528ad22fbd92a8db1a595686b741fd096b8db02fa345d1b

    • SSDEEP

      6144:lrkW9uEo2S1YnQmCX492DkwNP3qpYF4AqqWb+qR9h+uqkNfoM6YV5TmNa1a3SyPy:lrkuu6/eIo4tQW62T+uTwM6YVxm24y

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks