General

  • Target

    0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7

  • Size

    7.3MB

  • Sample

    220708-jtgyxagcbq

  • MD5

    5677e0d59fea82ee3429ce9c4e8134a4

  • SHA1

    80e74985ff0e651a9cd18298614fa0994cb6c183

  • SHA256

    0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7

  • SHA512

    5e649c4886fedb75f1f4d5751fafc78557669c6a0d885ff2ff8dce530ef3dd19059d809c3ca284b25773de01fc83fc4009ef38c394eec0d2db2165a737679341

Score
6/10

Malware Config

Targets

    • Target

      0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7

    • Size

      7.3MB

    • MD5

      5677e0d59fea82ee3429ce9c4e8134a4

    • SHA1

      80e74985ff0e651a9cd18298614fa0994cb6c183

    • SHA256

      0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7

    • SHA512

      5e649c4886fedb75f1f4d5751fafc78557669c6a0d885ff2ff8dce530ef3dd19059d809c3ca284b25773de01fc83fc4009ef38c394eec0d2db2165a737679341

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks