General

  • Target

    2adf8fb545d4d134f0ae3ed71d4d66d27e0653f8507739ab65023c8336882f3f

  • Size

    88KB

  • Sample

    221030-admd1sddgm

  • MD5

    92dc8428a9774403c359f8d9983a30b4

  • SHA1

    e208981273f2d790fb6f1cc5025621411b94690d

  • SHA256

    2adf8fb545d4d134f0ae3ed71d4d66d27e0653f8507739ab65023c8336882f3f

  • SHA512

    fe6e588c9d97b60a3e510043fe14ab8d8440f1de7b1cb09540a2c11f4327234a5b99302da70ef66c5ad408b818b53c9594795d589193b79decc3e05a580aa836

  • SSDEEP

    768:HNrGqbv4Clcv1oYdnVCNB4W+1zqj26K8yogMSHU4Cwi84KhJio/RcQMohPVuCdu:HXcClcvqWVCNBM7ooHcoPVuWu

Score
6/10

Malware Config

Targets

    • Target

      2adf8fb545d4d134f0ae3ed71d4d66d27e0653f8507739ab65023c8336882f3f

    • Size

      88KB

    • MD5

      92dc8428a9774403c359f8d9983a30b4

    • SHA1

      e208981273f2d790fb6f1cc5025621411b94690d

    • SHA256

      2adf8fb545d4d134f0ae3ed71d4d66d27e0653f8507739ab65023c8336882f3f

    • SHA512

      fe6e588c9d97b60a3e510043fe14ab8d8440f1de7b1cb09540a2c11f4327234a5b99302da70ef66c5ad408b818b53c9594795d589193b79decc3e05a580aa836

    • SSDEEP

      768:HNrGqbv4Clcv1oYdnVCNB4W+1zqj26K8yogMSHU4Cwi84KhJio/RcQMohPVuCdu:HXcClcvqWVCNBM7ooHcoPVuWu

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks