General

  • Target

    a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb

  • Size

    48KB

  • Sample

    221107-a63ayacfcq

  • MD5

    0ea795f9d289ef714bc88c509ded98a0

  • SHA1

    30b536cf23e62205c988daea178cb6e39df0c92b

  • SHA256

    a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb

  • SHA512

    9661b588c7395b65bc2a4e6ef07679c1eaf5be1c6d80936de205478e6e14adb6431b65046fcea2f5eae3fd8d3907c79443553549a511bff15df5812ef073d8e7

  • SSDEEP

    768:NNLBE8Rb3hDIjtSdXHqieKb9nP9LYWGDIniI1:NNL/Rb3VStyeKrYWAW

Score
6/10

Malware Config

Targets

    • Target

      a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb

    • Size

      48KB

    • MD5

      0ea795f9d289ef714bc88c509ded98a0

    • SHA1

      30b536cf23e62205c988daea178cb6e39df0c92b

    • SHA256

      a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb

    • SHA512

      9661b588c7395b65bc2a4e6ef07679c1eaf5be1c6d80936de205478e6e14adb6431b65046fcea2f5eae3fd8d3907c79443553549a511bff15df5812ef073d8e7

    • SSDEEP

      768:NNLBE8Rb3hDIjtSdXHqieKb9nP9LYWGDIniI1:NNL/Rb3VStyeKrYWAW

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks