General

  • Target

    1a1a7abee583b39273170de1adb3b688e1bd4d6f03607c6f3c53a951e5ad1a36

  • Size

    31KB

  • Sample

    221003-tx7nvaegd4

  • MD5

    5364b7c3acc36b67cd78cb3415b758e5

  • SHA1

    471a7385c4921ef9e346cb78362069a8e3d55547

  • SHA256

    1a1a7abee583b39273170de1adb3b688e1bd4d6f03607c6f3c53a951e5ad1a36

  • SHA512

    707fef4fd0a95aa7d0c8393bc687ae17f84815dccb501f8e22ecc816451064db22cc22fe44ac4cc3a91393f5f522f759de7a9f446b72367ef0208ba52fa56190

  • SSDEEP

    768:ZpAKO5khO0gwYnnXFpX3wDwvUQHOwnhs2icABS+:Ze0hOVrXFpnDvOS+

Score
6/10

Malware Config

Targets

    • Target

      1a1a7abee583b39273170de1adb3b688e1bd4d6f03607c6f3c53a951e5ad1a36

    • Size

      31KB

    • MD5

      5364b7c3acc36b67cd78cb3415b758e5

    • SHA1

      471a7385c4921ef9e346cb78362069a8e3d55547

    • SHA256

      1a1a7abee583b39273170de1adb3b688e1bd4d6f03607c6f3c53a951e5ad1a36

    • SHA512

      707fef4fd0a95aa7d0c8393bc687ae17f84815dccb501f8e22ecc816451064db22cc22fe44ac4cc3a91393f5f522f759de7a9f446b72367ef0208ba52fa56190

    • SSDEEP

      768:ZpAKO5khO0gwYnnXFpX3wDwvUQHOwnhs2icABS+:Ze0hOVrXFpnDvOS+

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks