General

  • Target

    6f383664bef6eb89d67ef468d81a2976d50950a5d49603161cbb025cca20cfc5

  • Size

    32KB

  • Sample

    221003-dakb2ache2

  • MD5

    63431dab03b75055452599045e3dc000

  • SHA1

    c7bc703526f85159b7476e66832b1b11b521ad95

  • SHA256

    6f383664bef6eb89d67ef468d81a2976d50950a5d49603161cbb025cca20cfc5

  • SHA512

    0e95f12fc84b0c0013e2869889e229d659b7a0701daf83044123dec84f5e58ccc8e2c02bed9190d0dbf87d89ae0941e9e2eca9c6ed8b0b142e6e8d6c1306e4c5

  • SSDEEP

    768:Nq84k0UOCAkjJ1t8viHdqwd6PAlB+M2UwFmG1F5+jnpxlIy2AWM:Nb43FCLds6H0w7B+MemGQk

Score
6/10

Malware Config

Targets

    • Target

      6f383664bef6eb89d67ef468d81a2976d50950a5d49603161cbb025cca20cfc5

    • Size

      32KB

    • MD5

      63431dab03b75055452599045e3dc000

    • SHA1

      c7bc703526f85159b7476e66832b1b11b521ad95

    • SHA256

      6f383664bef6eb89d67ef468d81a2976d50950a5d49603161cbb025cca20cfc5

    • SHA512

      0e95f12fc84b0c0013e2869889e229d659b7a0701daf83044123dec84f5e58ccc8e2c02bed9190d0dbf87d89ae0941e9e2eca9c6ed8b0b142e6e8d6c1306e4c5

    • SSDEEP

      768:Nq84k0UOCAkjJ1t8viHdqwd6PAlB+M2UwFmG1F5+jnpxlIy2AWM:Nb43FCLds6H0w7B+MemGQk

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks