General

  • Target

    8a0a5c84a0e0f1f04847cec62beee856

  • Size

    4.0MB

  • Sample

    240202-ve2wbadacp

  • MD5

    8a0a5c84a0e0f1f04847cec62beee856

  • SHA1

    17bde1bc65f16c052724dbec0ca8eebff1683a65

  • SHA256

    20b50cfce59e35276a70069a6b8fc338b9dd121b4dde7e51b853054dd66eac44

  • SHA512

    25204acfb08883bcfaf86dcc5eb6069c0694ed9ec93ec7bb459a11a79d567d365431ca1cb277dfe3bfbeac3f1486b475bdc7f3c4e5ba7f29e1a5c09d4ffab6ce

  • SSDEEP

    98304:hR+VT8kLkC70KYaotcJQCYmMcGGwfSQT8ujb/h:OVToCQKYPiJQSQhqJujbJ

Score
9/10

Malware Config

Targets

    • Target

      8a0a5c84a0e0f1f04847cec62beee856

    • Size

      4.0MB

    • MD5

      8a0a5c84a0e0f1f04847cec62beee856

    • SHA1

      17bde1bc65f16c052724dbec0ca8eebff1683a65

    • SHA256

      20b50cfce59e35276a70069a6b8fc338b9dd121b4dde7e51b853054dd66eac44

    • SHA512

      25204acfb08883bcfaf86dcc5eb6069c0694ed9ec93ec7bb459a11a79d567d365431ca1cb277dfe3bfbeac3f1486b475bdc7f3c4e5ba7f29e1a5c09d4ffab6ce

    • SSDEEP

      98304:hR+VT8kLkC70KYaotcJQCYmMcGGwfSQT8ujb/h:OVToCQKYPiJQSQhqJujbJ

    Score
    9/10
    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks