General

  • Target

    d3e458dd0095953ed7064594d8d2bc572bd99a77d5747a8c5017c8d5d855681e

  • Size

    40KB

  • Sample

    221029-w85dzaabh4

  • MD5

    4bcf691d35c26914251eb519b5ef6b40

  • SHA1

    8c77fbcd11c25e3344ee2264e065da67142dbcc5

  • SHA256

    d3e458dd0095953ed7064594d8d2bc572bd99a77d5747a8c5017c8d5d855681e

  • SHA512

    01231bae2058911a4650cedee9ac25dcfa11e6096664131e9463fff6f43956d44f7c426b09ffb5623da8ec0e1e227e8edec2ae2c345ba869134d1a6cbf52ed01

  • SSDEEP

    768:K7GBSF6LygsRA4Tc5avpdDtZzCeOhlF2ajPBF:eGwF6+gQTc50pNzHOhlFp

Score
6/10

Malware Config

Targets

    • Target

      d3e458dd0095953ed7064594d8d2bc572bd99a77d5747a8c5017c8d5d855681e

    • Size

      40KB

    • MD5

      4bcf691d35c26914251eb519b5ef6b40

    • SHA1

      8c77fbcd11c25e3344ee2264e065da67142dbcc5

    • SHA256

      d3e458dd0095953ed7064594d8d2bc572bd99a77d5747a8c5017c8d5d855681e

    • SHA512

      01231bae2058911a4650cedee9ac25dcfa11e6096664131e9463fff6f43956d44f7c426b09ffb5623da8ec0e1e227e8edec2ae2c345ba869134d1a6cbf52ed01

    • SSDEEP

      768:K7GBSF6LygsRA4Tc5avpdDtZzCeOhlF2ajPBF:eGwF6+gQTc50pNzHOhlFp

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks