General

  • Target

    a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9

  • Size

    48KB

  • Sample

    221107-bbyvpsaef4

  • MD5

    01a6343bf5c94faa9a908667d8f7a0c0

  • SHA1

    a8c2fef91ac127813f6ae7e83478b7aff0487caf

  • SHA256

    a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9

  • SHA512

    4c2be42832f0fc5d724ad7b52b6ab0f369478942a0d21220e1ae8a3333dd4aff0497936bab5d1ae74458cbf885ce2ab38e6193190004fb51dc8f0ecc7b9bbc78

  • SSDEEP

    768:HAtTC5vo1llVIU/8IC3QrVauKOc+vz8538V/TPD+RrpTUb:HAtTkEq+auKwvAJun3

Score
6/10

Malware Config

Targets

    • Target

      a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9

    • Size

      48KB

    • MD5

      01a6343bf5c94faa9a908667d8f7a0c0

    • SHA1

      a8c2fef91ac127813f6ae7e83478b7aff0487caf

    • SHA256

      a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9

    • SHA512

      4c2be42832f0fc5d724ad7b52b6ab0f369478942a0d21220e1ae8a3333dd4aff0497936bab5d1ae74458cbf885ce2ab38e6193190004fb51dc8f0ecc7b9bbc78

    • SSDEEP

      768:HAtTC5vo1llVIU/8IC3QrVauKOc+vz8538V/TPD+RrpTUb:HAtTkEq+auKwvAJun3

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks