General

  • Target

    b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7

  • Size

    824KB

  • Sample

    221030-yfc55agae8

  • MD5

    90e59bd02a81259d56b8f03dc589381a

  • SHA1

    00dac09b4f5e2e7334168addc2f6e7e6d36c0d6d

  • SHA256

    b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7

  • SHA512

    4acd0648ff8214fd3e1204be83c6bae530287581c93d787cfdf77c176571f97a4b46c27f7833dc84dbf6e242c6c6d6c968a22812e7c3b935d0f54786ad978804

  • SSDEEP

    6144:/AXlTcJraBCDorAB2wiAdraBCDoAc769/c:gSraB5graByc769k

Score
6/10

Malware Config

Targets

    • Target

      b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7

    • Size

      824KB

    • MD5

      90e59bd02a81259d56b8f03dc589381a

    • SHA1

      00dac09b4f5e2e7334168addc2f6e7e6d36c0d6d

    • SHA256

      b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7

    • SHA512

      4acd0648ff8214fd3e1204be83c6bae530287581c93d787cfdf77c176571f97a4b46c27f7833dc84dbf6e242c6c6d6c968a22812e7c3b935d0f54786ad978804

    • SSDEEP

      6144:/AXlTcJraBCDorAB2wiAdraBCDoAc769/c:gSraB5graByc769k

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks