General

  • Target

    dcd7c43a38741fe071170419c71cdb3ca3a42edbb91f25a298010c09dc00f8ee

  • Size

    52KB

  • Sample

    221030-zckapshfg6

  • MD5

    90d3173735bd460f7bd749c3e09cd660

  • SHA1

    7165a631f50ad863ab0c49d9f4d6af043caf778d

  • SHA256

    dcd7c43a38741fe071170419c71cdb3ca3a42edbb91f25a298010c09dc00f8ee

  • SHA512

    5dffe9ba9fe059bad9e206aa02b988de0d5adffa0e73213200861a4e817712872c918a2145155157bdc56e7b38728ad6deae6ae8090d28e2923656e9227d73bf

  • SSDEEP

    768:v+RQSY0gQOLALe06Vc73P/VcUY/CSXQ6Nhirqbbm0tSw:v+w0+ALe06Vc73VGCV6OyFp

Score
6/10

Malware Config

Targets

    • Target

      dcd7c43a38741fe071170419c71cdb3ca3a42edbb91f25a298010c09dc00f8ee

    • Size

      52KB

    • MD5

      90d3173735bd460f7bd749c3e09cd660

    • SHA1

      7165a631f50ad863ab0c49d9f4d6af043caf778d

    • SHA256

      dcd7c43a38741fe071170419c71cdb3ca3a42edbb91f25a298010c09dc00f8ee

    • SHA512

      5dffe9ba9fe059bad9e206aa02b988de0d5adffa0e73213200861a4e817712872c918a2145155157bdc56e7b38728ad6deae6ae8090d28e2923656e9227d73bf

    • SSDEEP

      768:v+RQSY0gQOLALe06Vc73P/VcUY/CSXQ6Nhirqbbm0tSw:v+w0+ALe06Vc73VGCV6OyFp

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks