General

  • Target

    sample

  • Size

    19KB

  • Sample

    240522-tdjsnsgd85

  • MD5

    2649ef263ff8134bdf7ec5272e53d97f

  • SHA1

    6fe8403f0b004d7546294030effd6bcbcf0d3ce6

  • SHA256

    0c5992518157a854b06d4641cbad3993f5d2137b021e7a26587265620624b550

  • SHA512

    4ae6d3127cedf52f75564c3fe5ab68eccafc3bab89f352dc9e978f1e2f4adec74ac2e6be371edecfeed221c8338cc1c097d300474be828addaf3fd3b8e9a0ad6

  • SSDEEP

    384:r7Zldc3vasDpmReVoOs4Mi9ylKeGM2U8Hhhbqdy7Qo2paWhOwob06++IJCgMmV6:rNcisBVoOs4MmyI1McBhb+UZWhOwob0w

Score
7/10

Malware Config

Targets

    • Target

      sample

    • Size

      19KB

    • MD5

      2649ef263ff8134bdf7ec5272e53d97f

    • SHA1

      6fe8403f0b004d7546294030effd6bcbcf0d3ce6

    • SHA256

      0c5992518157a854b06d4641cbad3993f5d2137b021e7a26587265620624b550

    • SHA512

      4ae6d3127cedf52f75564c3fe5ab68eccafc3bab89f352dc9e978f1e2f4adec74ac2e6be371edecfeed221c8338cc1c097d300474be828addaf3fd3b8e9a0ad6

    • SSDEEP

      384:r7Zldc3vasDpmReVoOs4Mi9ylKeGM2U8Hhhbqdy7Qo2paWhOwob06++IJCgMmV6:rNcisBVoOs4MmyI1McBhb+UZWhOwob0w

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks