General

  • Target

    ee129d94c21db49d32e8617814364468d9fcd17f543f7e4c30259560e31844b9

  • Size

    445KB

  • Sample

    221130-rjjczsbb4w

  • MD5

    16d37e17c222118325263e4768a27970

  • SHA1

    601d4b66fa04fe446a65a3c07c0b00ad5b1dc5b8

  • SHA256

    ee129d94c21db49d32e8617814364468d9fcd17f543f7e4c30259560e31844b9

  • SHA512

    fe190482ff9efae7bd3574d541688e015146ac6c03d57270771666aba10fcaff545e385f6cda54a468065b8bae7f6751922e112436a5a5cd025f33b2c78245b9

  • SSDEEP

    12288:52JylsKT/eDQ4dvfLKbhseRwJLqEfYKzvE:52Jyx7YvshseR8vE

Malware Config

Targets

    • Target

      ee129d94c21db49d32e8617814364468d9fcd17f543f7e4c30259560e31844b9

    • Size

      445KB

    • MD5

      16d37e17c222118325263e4768a27970

    • SHA1

      601d4b66fa04fe446a65a3c07c0b00ad5b1dc5b8

    • SHA256

      ee129d94c21db49d32e8617814364468d9fcd17f543f7e4c30259560e31844b9

    • SHA512

      fe190482ff9efae7bd3574d541688e015146ac6c03d57270771666aba10fcaff545e385f6cda54a468065b8bae7f6751922e112436a5a5cd025f33b2c78245b9

    • SSDEEP

      12288:52JylsKT/eDQ4dvfLKbhseRwJLqEfYKzvE:52Jyx7YvshseR8vE

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks