General

  • Target

    1e430d799efb076fba47c6f3ae62ac295012032d69ba096de302d736cd353d41

  • Size

    26KB

  • Sample

    221205-s25vdaga4x

  • MD5

    01fccff3df79a15cf9ce08ba256c6a63

  • SHA1

    5cf02d70ac14ba2bab943cb020601dd3e8158d2f

  • SHA256

    1e430d799efb076fba47c6f3ae62ac295012032d69ba096de302d736cd353d41

  • SHA512

    f3941f8c6329b2d79f09eeb760e0edb0953a72af3f605c99231e2fb71deefa95693e3ea4eb0bd942f2d4e73caa0bb01dfa318336c6f14117fd7db64bb467c885

  • SSDEEP

    384:9s/y33MPT/xt+kmJkaHc3U8k31DgDxO1qGzIcZblnm50RNlXXbDXJ6d:IysPT/tmJB83URDgVwzFZZq4XPZM

Score
8/10

Malware Config

Targets

    • Target

      1e430d799efb076fba47c6f3ae62ac295012032d69ba096de302d736cd353d41

    • Size

      26KB

    • MD5

      01fccff3df79a15cf9ce08ba256c6a63

    • SHA1

      5cf02d70ac14ba2bab943cb020601dd3e8158d2f

    • SHA256

      1e430d799efb076fba47c6f3ae62ac295012032d69ba096de302d736cd353d41

    • SHA512

      f3941f8c6329b2d79f09eeb760e0edb0953a72af3f605c99231e2fb71deefa95693e3ea4eb0bd942f2d4e73caa0bb01dfa318336c6f14117fd7db64bb467c885

    • SSDEEP

      384:9s/y33MPT/xt+kmJkaHc3U8k31DgDxO1qGzIcZblnm50RNlXXbDXJ6d:IysPT/tmJB83URDgVwzFZZq4XPZM

    Score
    8/10
    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks