General

  • Target

    a76b49533f51f0bffb35402459bec2fd2a63433b5bc3b90589462841cfa595b2

  • Size

    32KB

  • Sample

    221020-l48wgsggem

  • MD5

    96580a590d3aa60037ebf92f9e5d44a0

  • SHA1

    4f8473c30161ed5e0cdc9c31e93be4c47e9ff5d6

  • SHA256

    a76b49533f51f0bffb35402459bec2fd2a63433b5bc3b90589462841cfa595b2

  • SHA512

    bb38b056f4078001524743fd85ed248437a69a549cb7e5bc797d0567c7797db369441a42226135132aca41f80e26887da47ae31e999166f04a638c59bbf9f507

  • SSDEEP

    768:BWvVEswbfgLz0ahs94ImlEP9Vl3FitHUbt5fU61Vp:BWv9iILzo9jVl3Fit0XUeV

Score
6/10

Malware Config

Targets

    • Target

      a76b49533f51f0bffb35402459bec2fd2a63433b5bc3b90589462841cfa595b2

    • Size

      32KB

    • MD5

      96580a590d3aa60037ebf92f9e5d44a0

    • SHA1

      4f8473c30161ed5e0cdc9c31e93be4c47e9ff5d6

    • SHA256

      a76b49533f51f0bffb35402459bec2fd2a63433b5bc3b90589462841cfa595b2

    • SHA512

      bb38b056f4078001524743fd85ed248437a69a549cb7e5bc797d0567c7797db369441a42226135132aca41f80e26887da47ae31e999166f04a638c59bbf9f507

    • SSDEEP

      768:BWvVEswbfgLz0ahs94ImlEP9Vl3FitHUbt5fU61Vp:BWv9iILzo9jVl3Fit0XUeV

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks