General

  • Target

    43800fcc6977ccb1740bd5b4a881fbdbeaf1aac8d166df9e236924e102049745

  • Size

    96KB

  • Sample

    220919-hzr6dsdfb2

  • MD5

    b48c6fb8e9f4589a5b48f67508102feb

  • SHA1

    4c0fa98ff2ee3d482f4a246705ef78b0ebe9d932

  • SHA256

    43800fcc6977ccb1740bd5b4a881fbdbeaf1aac8d166df9e236924e102049745

  • SHA512

    d11c08241a5742a70f03a56b37e37e8577650b760730e46036da8a6088f83e8ba027fe47d4545eb1e2b37531d0a8dd0078edfb4d2180fa86f0016221818791fc

  • SSDEEP

    1536:Fa49mg5Tf9u82v4Gnod0C5l5MeZ19iiwhT/nBp975WU:w4IgZfY9Cd0gmAMlnv97YU

Score
6/10

Malware Config

Targets

    • Target

      43800fcc6977ccb1740bd5b4a881fbdbeaf1aac8d166df9e236924e102049745

    • Size

      96KB

    • MD5

      b48c6fb8e9f4589a5b48f67508102feb

    • SHA1

      4c0fa98ff2ee3d482f4a246705ef78b0ebe9d932

    • SHA256

      43800fcc6977ccb1740bd5b4a881fbdbeaf1aac8d166df9e236924e102049745

    • SHA512

      d11c08241a5742a70f03a56b37e37e8577650b760730e46036da8a6088f83e8ba027fe47d4545eb1e2b37531d0a8dd0078edfb4d2180fa86f0016221818791fc

    • SSDEEP

      1536:Fa49mg5Tf9u82v4Gnod0C5l5MeZ19iiwhT/nBp975WU:w4IgZfY9Cd0gmAMlnv97YU

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks