General

  • Target

    cd5b1cba41d74874a44e57a47b863c11821b42c466a6e44a2c75a66e8209abff

  • Size

    257KB

  • Sample

    221019-rgm86abfcq

  • MD5

    90b07e88ed7959e38d59900ef90dc320

  • SHA1

    107a90b9905a3bc73428a43cab6fd74e3954c3c6

  • SHA256

    cd5b1cba41d74874a44e57a47b863c11821b42c466a6e44a2c75a66e8209abff

  • SHA512

    0a251dffe5577d117e8ccea3d735f1721b2ff962040ec8f5085099850db302007759f7218d04ef3c464ec03e3318c733669bcee8f07a8f484231f7ae1317d03d

  • SSDEEP

    6144:EVTrBn457tFf4+6CC9jqgGjgVgtEbX66NhnJWEUj:Fg+6CC9jqgGju3hnJJUj

Score
8/10

Malware Config

Targets

    • Target

      cd5b1cba41d74874a44e57a47b863c11821b42c466a6e44a2c75a66e8209abff

    • Size

      257KB

    • MD5

      90b07e88ed7959e38d59900ef90dc320

    • SHA1

      107a90b9905a3bc73428a43cab6fd74e3954c3c6

    • SHA256

      cd5b1cba41d74874a44e57a47b863c11821b42c466a6e44a2c75a66e8209abff

    • SHA512

      0a251dffe5577d117e8ccea3d735f1721b2ff962040ec8f5085099850db302007759f7218d04ef3c464ec03e3318c733669bcee8f07a8f484231f7ae1317d03d

    • SSDEEP

      6144:EVTrBn457tFf4+6CC9jqgGjgVgtEbX66NhnJWEUj:Fg+6CC9jqgGju3hnJJUj

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks