General

  • Target

    fb89046bc8a7d1f90871e90ef59961921b24cf0e8587307128f08ade5770fc3c

  • Size

    33KB

  • Sample

    221203-mxfrssgd9w

  • MD5

    6339ddc282b8bef164dd4a1ad7cd1017

  • SHA1

    65d60b886494c26cd812f0ebb67d8b038c0ed083

  • SHA256

    fb89046bc8a7d1f90871e90ef59961921b24cf0e8587307128f08ade5770fc3c

  • SHA512

    c3011c5838cc3a7eeaa37a9811365f35d679239dba740ef779d09603a4c9fc92c095ec19fb49ffae541cef2c6fe5e75464562c186b713aa5520dcc226c27e840

  • SSDEEP

    384:wuH+6ahr6YDUCCR0FaJgffmFdJwYDcRw45H0rikLKY:wk+5nD7BaJgWFda4cJq

Score
8/10

Malware Config

Targets

    • Target

      fb89046bc8a7d1f90871e90ef59961921b24cf0e8587307128f08ade5770fc3c

    • Size

      33KB

    • MD5

      6339ddc282b8bef164dd4a1ad7cd1017

    • SHA1

      65d60b886494c26cd812f0ebb67d8b038c0ed083

    • SHA256

      fb89046bc8a7d1f90871e90ef59961921b24cf0e8587307128f08ade5770fc3c

    • SHA512

      c3011c5838cc3a7eeaa37a9811365f35d679239dba740ef779d09603a4c9fc92c095ec19fb49ffae541cef2c6fe5e75464562c186b713aa5520dcc226c27e840

    • SSDEEP

      384:wuH+6ahr6YDUCCR0FaJgffmFdJwYDcRw45H0rikLKY:wk+5nD7BaJgWFda4cJq

    Score
    8/10
    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks