General

  • Target

    Imaginary Technique Purple.mp4

  • Size

    15.3MB

  • Sample

    240320-ay13xacf7y

  • MD5

    d4ee9dc8a808c334aac549c5c542229d

  • SHA1

    71ab3d48f7b627348a88b239da436d74af9330ba

  • SHA256

    f24e5688453cb726b807cdc9bf7db895eb0864b104eff16c2098dcdb8c1e47b1

  • SHA512

    faf8570aa962e9c15e667b56ff3dd4eb3f4a1442d202b171029b71f422bb5d02a61a81adac3893be5abdb072b658ad7cd46638527bf9b10bc3526562cf725054

  • SSDEEP

    393216:vcasGgME/6ghP4Fi35LSZYIJ5yw3qGLVO10d8qevH59DSH:vKdJ1IJ5yw3d5A00vH59Da

Score
6/10

Malware Config

Targets

    • Target

      Imaginary Technique Purple.mp4

    • Size

      15.3MB

    • MD5

      d4ee9dc8a808c334aac549c5c542229d

    • SHA1

      71ab3d48f7b627348a88b239da436d74af9330ba

    • SHA256

      f24e5688453cb726b807cdc9bf7db895eb0864b104eff16c2098dcdb8c1e47b1

    • SHA512

      faf8570aa962e9c15e667b56ff3dd4eb3f4a1442d202b171029b71f422bb5d02a61a81adac3893be5abdb072b658ad7cd46638527bf9b10bc3526562cf725054

    • SSDEEP

      393216:vcasGgME/6ghP4Fi35LSZYIJ5yw3qGLVO10d8qevH59DSH:vKdJ1IJ5yw3d5A00vH59Da

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks