General

  • Target

    c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055

  • Size

    35KB

  • Sample

    221106-sfnc7sgde3

  • MD5

    0c7c1ab9e11debbe6148124ce713c6a8

  • SHA1

    43d88a9a56a4401b4345869780da5fb227998f42

  • SHA256

    c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055

  • SHA512

    4d21d3c27326ba3fe1d45eb0c6aaac867afd112bd775f2f161e29cf5b9ead5764eeacbd17973598788d3f6d556ab4b041c889a1501f36782ebb143026da1aeb4

  • SSDEEP

    768:lCSr3Ome2Om19VtFtkMYlIxEq+BeuOV1jeYFZgsYdTW5yAWcUOpsYsu:lCYOme2Om19VtFtkMYlIx/MHOVJnFZge

Score
6/10

Malware Config

Targets

    • Target

      c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055

    • Size

      35KB

    • MD5

      0c7c1ab9e11debbe6148124ce713c6a8

    • SHA1

      43d88a9a56a4401b4345869780da5fb227998f42

    • SHA256

      c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055

    • SHA512

      4d21d3c27326ba3fe1d45eb0c6aaac867afd112bd775f2f161e29cf5b9ead5764eeacbd17973598788d3f6d556ab4b041c889a1501f36782ebb143026da1aeb4

    • SSDEEP

      768:lCSr3Ome2Om19VtFtkMYlIxEq+BeuOV1jeYFZgsYdTW5yAWcUOpsYsu:lCYOme2Om19VtFtkMYlIx/MHOVJnFZge

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks