General

  • Target

    da2ef11dfcc36d7ca452f2aede9aa4614b9fcbab3e55d584ca3c52fd714b98ad

  • Size

    72KB

  • Sample

    221003-j9w3rsgdfj

  • MD5

    643d562655e7405d981b839891b2e950

  • SHA1

    4fe1923cb1eafa0957b5121d3316d23077156924

  • SHA256

    da2ef11dfcc36d7ca452f2aede9aa4614b9fcbab3e55d584ca3c52fd714b98ad

  • SHA512

    41090976937b494bc55ba5ab25562ba6e06503a335d9694ec76b6cb2f52eb7f43c5ec87b17733a82659cdbb2839af7eb12a5194c2b8963b9d971a9e77ec74c06

  • SSDEEP

    1536:dBenOsjmd49Q3H75pn+EnXEoptXf6i+OTEsEt95ycyLnZSAo/mb+4n:XimYmpUoptXf6i+OTnEt95ycyLnZSAEK

Score
6/10

Malware Config

Targets

    • Target

      da2ef11dfcc36d7ca452f2aede9aa4614b9fcbab3e55d584ca3c52fd714b98ad

    • Size

      72KB

    • MD5

      643d562655e7405d981b839891b2e950

    • SHA1

      4fe1923cb1eafa0957b5121d3316d23077156924

    • SHA256

      da2ef11dfcc36d7ca452f2aede9aa4614b9fcbab3e55d584ca3c52fd714b98ad

    • SHA512

      41090976937b494bc55ba5ab25562ba6e06503a335d9694ec76b6cb2f52eb7f43c5ec87b17733a82659cdbb2839af7eb12a5194c2b8963b9d971a9e77ec74c06

    • SSDEEP

      1536:dBenOsjmd49Q3H75pn+EnXEoptXf6i+OTEsEt95ycyLnZSAo/mb+4n:XimYmpUoptXf6i+OTnEt95ycyLnZSAEK

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks