General

  • Target

    bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947

  • Size

    22.6MB

  • Sample

    240524-d4wxxsbe41

  • MD5

    8483bf7c4976434e3b17314cf88421dd

  • SHA1

    4e366c1777e22df3fedd95b9c10f5c6458043b7e

  • SHA256

    bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947

  • SHA512

    c1f0cd2c30f041ff1d4ea533723993249abf1f6b5acddce9a5108c028153f3250f72ab0eb69a91005af8080c5acacaeec79a5cc5969fa5d3a5869b7fcce9a114

  • SSDEEP

    196608:TbMpO6vsGbhrSu3CEde9ocED+KiCya6nJmR:TbQ6u3LdeWc2yhJm

Score
10/10

Malware Config

Targets

    • Target

      bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947

    • Size

      22.6MB

    • MD5

      8483bf7c4976434e3b17314cf88421dd

    • SHA1

      4e366c1777e22df3fedd95b9c10f5c6458043b7e

    • SHA256

      bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947

    • SHA512

      c1f0cd2c30f041ff1d4ea533723993249abf1f6b5acddce9a5108c028153f3250f72ab0eb69a91005af8080c5acacaeec79a5cc5969fa5d3a5869b7fcce9a114

    • SSDEEP

      196608:TbMpO6vsGbhrSu3CEde9ocED+KiCya6nJmR:TbQ6u3LdeWc2yhJm

    Score
    6/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks