General

  • Target

    13baa4f0bc79cf0ba518a0d0424a5efb4cc7076ea42a3bd40bff81050b3debe6

  • Size

    316KB

  • Sample

    221124-jgrmkscb71

  • MD5

    fd07d33713caf46dfb0acc24341668f0

  • SHA1

    c3e96f54b8747560fd8941aba6d9d6686f9fe5d9

  • SHA256

    13baa4f0bc79cf0ba518a0d0424a5efb4cc7076ea42a3bd40bff81050b3debe6

  • SHA512

    c13f33aa719cf3efc5233bbbed08de72b2dd03ecca4b4d4773e80d4ba3ec74436023b48ea4d50a250819b0c72cd5ac7494ad416ac4f4ff5f0562196960e12025

  • SSDEEP

    6144:6ribUzkuvcBYC47l2xLNaFmoKZLxtHU/TMDkW01eedmQb+xo:6r7kuveY33FJUo7MDkA6l

Score
7/10

Malware Config

Targets

    • Target

      13baa4f0bc79cf0ba518a0d0424a5efb4cc7076ea42a3bd40bff81050b3debe6

    • Size

      316KB

    • MD5

      fd07d33713caf46dfb0acc24341668f0

    • SHA1

      c3e96f54b8747560fd8941aba6d9d6686f9fe5d9

    • SHA256

      13baa4f0bc79cf0ba518a0d0424a5efb4cc7076ea42a3bd40bff81050b3debe6

    • SHA512

      c13f33aa719cf3efc5233bbbed08de72b2dd03ecca4b4d4773e80d4ba3ec74436023b48ea4d50a250819b0c72cd5ac7494ad416ac4f4ff5f0562196960e12025

    • SSDEEP

      6144:6ribUzkuvcBYC47l2xLNaFmoKZLxtHU/TMDkW01eedmQb+xo:6r7kuveY33FJUo7MDkA6l

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks