General

  • Target

    c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589

  • Size

    139KB

  • Sample

    221002-swgwcseadl

  • MD5

    6b9f08c4190f3eb93de7834a2cee3663

  • SHA1

    c1712700c829722baa61f22535160d3c872c57fe

  • SHA256

    c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589

  • SHA512

    adca44ef0b771fa25ccf64d84414b4fefb255473d9e5ae0e702296bb060a3e33d060c9051eff097b233523ba83b5a0008702e09efb391f52d818b60c864040cf

  • SSDEEP

    1536:xvrUJTPeMZ0YXKzsr3sxg995rFrdDiDgjJVh+XnHWa9wo:do3G3i5rFyaJufH

Score
6/10

Malware Config

Targets

    • Target

      c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589

    • Size

      139KB

    • MD5

      6b9f08c4190f3eb93de7834a2cee3663

    • SHA1

      c1712700c829722baa61f22535160d3c872c57fe

    • SHA256

      c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589

    • SHA512

      adca44ef0b771fa25ccf64d84414b4fefb255473d9e5ae0e702296bb060a3e33d060c9051eff097b233523ba83b5a0008702e09efb391f52d818b60c864040cf

    • SSDEEP

      1536:xvrUJTPeMZ0YXKzsr3sxg995rFrdDiDgjJVh+XnHWa9wo:do3G3i5rFyaJufH

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks