General

  • Target

    9b4bcd63e15a4b05a85049d5e557770708b1897f69d4f753cf979c0d9ddc098c

  • Size

    40KB

  • Sample

    221030-yq739ahfcp

  • MD5

    a2127f12bbf0e89357cf94d09b08f250

  • SHA1

    31cd862dd373a32897b263bbaf8ba14a64e1086e

  • SHA256

    9b4bcd63e15a4b05a85049d5e557770708b1897f69d4f753cf979c0d9ddc098c

  • SHA512

    6819bff81cb5cbbc4e97e0b643947607904cc9898137cb58232ade0e6e992b4e8b1525fe903f4e5e1dca47be17d7c061a99871b9e8527d34b180b158c0a29f2a

  • SSDEEP

    768:O0MqSkFF5kVIFTw2vIdYBgD36+dnOGXO5LILKw6Ie0djSH/sX:Obqru2wUId7rvvORs

Score
6/10

Malware Config

Targets

    • Target

      9b4bcd63e15a4b05a85049d5e557770708b1897f69d4f753cf979c0d9ddc098c

    • Size

      40KB

    • MD5

      a2127f12bbf0e89357cf94d09b08f250

    • SHA1

      31cd862dd373a32897b263bbaf8ba14a64e1086e

    • SHA256

      9b4bcd63e15a4b05a85049d5e557770708b1897f69d4f753cf979c0d9ddc098c

    • SHA512

      6819bff81cb5cbbc4e97e0b643947607904cc9898137cb58232ade0e6e992b4e8b1525fe903f4e5e1dca47be17d7c061a99871b9e8527d34b180b158c0a29f2a

    • SSDEEP

      768:O0MqSkFF5kVIFTw2vIdYBgD36+dnOGXO5LILKw6Ie0djSH/sX:Obqru2wUId7rvvORs

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks