General

  • Target

    1a2d55b626994672f2609a88859e3e6fb426b94268299637f65b3613e2030dfd

  • Size

    64KB

  • Sample

    221028-1ey3bagfcp

  • MD5

    0523001299f75f7e95586cd7dea40e00

  • SHA1

    b2ff1eb41d23d47fb8fc33487afb4ef1ef58ce49

  • SHA256

    1a2d55b626994672f2609a88859e3e6fb426b94268299637f65b3613e2030dfd

  • SHA512

    fe1bdfc9df4a41a61aa2719863911f2dde5e1a49b2d0956970a3e1c3cb950204873c0e44f6c005646178095064b8facac574172fab617c7ddf5fb7b5f9469b43

  • SSDEEP

    768:JgNKlwsTJxpGoZSp/uVz1V3oOZOzC6u9XtFsAph7n:JgNKWkcoQpSV3pgC6K7f

Score
6/10

Malware Config

Targets

    • Target

      1a2d55b626994672f2609a88859e3e6fb426b94268299637f65b3613e2030dfd

    • Size

      64KB

    • MD5

      0523001299f75f7e95586cd7dea40e00

    • SHA1

      b2ff1eb41d23d47fb8fc33487afb4ef1ef58ce49

    • SHA256

      1a2d55b626994672f2609a88859e3e6fb426b94268299637f65b3613e2030dfd

    • SHA512

      fe1bdfc9df4a41a61aa2719863911f2dde5e1a49b2d0956970a3e1c3cb950204873c0e44f6c005646178095064b8facac574172fab617c7ddf5fb7b5f9469b43

    • SSDEEP

      768:JgNKlwsTJxpGoZSp/uVz1V3oOZOzC6u9XtFsAph7n:JgNKWkcoQpSV3pgC6K7f

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks