General

  • Target

    dd6ed56287cd25d770aa1de2976a31b2d1065b18b661a0986ab6af4289230a09

  • Size

    120KB

  • Sample

    221125-s3g5psbh9s

  • MD5

    6cb93379756e78187196bfaff65cbb50

  • SHA1

    fab8576c9c70f753a32a565ebee60b10d2dac5b8

  • SHA256

    dd6ed56287cd25d770aa1de2976a31b2d1065b18b661a0986ab6af4289230a09

  • SHA512

    32e887a34f64a649a6587b4813378de6a4ef58f7bb9d737f39dc8f53beebdafd65c8f5b0e64ab53c0418124024fa98ea8d309eb47fd8690c85227c32bf0a4543

  • SSDEEP

    3072:IvG7ySV7c2lCECtUeExLBwdJddCJHZlPD4Fx50BNrr5vR:IUc2xQSxydJzCJ5JcGrdR

Malware Config

Targets

    • Target

      dd6ed56287cd25d770aa1de2976a31b2d1065b18b661a0986ab6af4289230a09

    • Size

      120KB

    • MD5

      6cb93379756e78187196bfaff65cbb50

    • SHA1

      fab8576c9c70f753a32a565ebee60b10d2dac5b8

    • SHA256

      dd6ed56287cd25d770aa1de2976a31b2d1065b18b661a0986ab6af4289230a09

    • SHA512

      32e887a34f64a649a6587b4813378de6a4ef58f7bb9d737f39dc8f53beebdafd65c8f5b0e64ab53c0418124024fa98ea8d309eb47fd8690c85227c32bf0a4543

    • SSDEEP

      3072:IvG7ySV7c2lCECtUeExLBwdJddCJHZlPD4Fx50BNrr5vR:IUc2xQSxydJzCJ5JcGrdR

    • Adds policy Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks