General

  • Target

    0a3732ea250ef4832f0659c51df2b1acf72474590ab5756758adfd72ef6a0901

  • Size

    350KB

  • Sample

    220530-tgzy3aahh8

  • MD5

    f038e0808448a5702d9a200bbd9c2db7

  • SHA1

    af6243c460ebffab17ee48e28c846a5ec9423a6d

  • SHA256

    0a3732ea250ef4832f0659c51df2b1acf72474590ab5756758adfd72ef6a0901

  • SHA512

    e7cdabbeb3df8d71439799f93e849c003b7d0d9b0ec9bbe6b79801e4b4faaca9a85bc422b4bd354617a2657a66d72ff24917cef590724954b16ca4953e63bdbe

Score
7/10

Malware Config

Targets

    • Target

      0a3732ea250ef4832f0659c51df2b1acf72474590ab5756758adfd72ef6a0901

    • Size

      350KB

    • MD5

      f038e0808448a5702d9a200bbd9c2db7

    • SHA1

      af6243c460ebffab17ee48e28c846a5ec9423a6d

    • SHA256

      0a3732ea250ef4832f0659c51df2b1acf72474590ab5756758adfd72ef6a0901

    • SHA512

      e7cdabbeb3df8d71439799f93e849c003b7d0d9b0ec9bbe6b79801e4b4faaca9a85bc422b4bd354617a2657a66d72ff24917cef590724954b16ca4953e63bdbe

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks