General

  • Target

    97037131375846367140.zip

  • Size

    4.6MB

  • Sample

    240313-szxqzsae65

  • MD5

    eb7a694313f2d248914750eb30e7e99b

  • SHA1

    d861badf7ed5c40b1b88e72d7952c5591492fd1d

  • SHA256

    7e695c0f30328ca895782b201f8867e37cf928e13b1270b94035dda2ee8adff8

  • SHA512

    4340aeddbf561abfd462d6fd798f41e9c7f9fac19c64a58850fe2c8ff70ce60223de64202d3579828e434ae097fc976c083d6433c168834cb02b7b484bbcfb3c

  • SSDEEP

    98304:nmN5MI4laS7HuYDGMy+ohUNIEa/GXepxLXR9vbINRJMrlu8rJKrsWtmqd5ZH/fS:aN4laS7OIdVoARaOXe5ZbnVrJGAK5ZXS

Score
6/10

Malware Config

Targets

    • Target

      BVGQVFC-92845Ref-UVLDD9259338142.msi

    • Size

      12.5MB

    • MD5

      395f6fb782949263cd15e0a1ed131d65

    • SHA1

      67bd4dea0da0d667464be026a710b92a25531c5a

    • SHA256

      47eee2815a27c49b230bdf661f938068c5d3347c37ada6bf5940b1f6fc98288c

    • SHA512

      1251ac9278d87f4e2d97635787a0d3ff5c7f105692a73ecc39e8890e6f488473ad8c96464baf530719f446fe5a6923518b4ec52de0755475044a9b734d07f659

    • SSDEEP

      98304:8O+IroUnDAN1baX4brxnmDQXNAdXKIX04WDXkK++F8fVPkPf0:8crdGaeADQXcX0bkSyGX

    Score
    6/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      _________________________________________________________________________24144ULJRY06378DTAIJ.xml

    • Size

      16KB

    • MD5

      8e27998497215aa04caf5470e6cb7093

    • SHA1

      3d30d2d33b9df4656d4d0a58b00b0c8f3a6f4f75

    • SHA256

      0604388f107d1ed9abbb13912e5cdc2f9a2da8d0e528fbb4546c23b2f08c6f15

    • SHA512

      7ff947b92970f7af8862017ae6cc2e6acf6efa1c1e2ab6d1ad6e1ede7aa3f7c496f44792660dbd284b507598116f290940df431abb65baa27591a08177facdf8

    • SSDEEP

      192:nOoZ9Nyby2sE9jBF6IYiYF84+noPOJB3xZndj73oqp4f2br5hRJz:n59Nyb8E9VF6IYiTPxxZdnoqeChRd

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks