General

  • Target

    be60e144839cea58ccae7e4f59df7ae460a857650a9dfa7e222bd397032fd3b6

  • Size

    33KB

  • Sample

    221107-y6v4maaddk

  • MD5

    0bbe595239248689d067d0b9bbb5a9f1

  • SHA1

    109b0e1107d3ae3f11d5b694c879d9182f628981

  • SHA256

    be60e144839cea58ccae7e4f59df7ae460a857650a9dfa7e222bd397032fd3b6

  • SHA512

    f0eab1cf71a6458c3daba629200c37c1cd3fa45c01f2d1946208ba5fd203bc43564f14fe901f9a6b8546b59cb2cd85ba66f410ea46c822a61e082573368d22ef

  • SSDEEP

    768:gp2Oj/4UIYwXRBs9kEGcXi0fgn8rnkCCI:gp2GXIdRBcGcX73

Score
6/10

Malware Config

Targets

    • Target

      be60e144839cea58ccae7e4f59df7ae460a857650a9dfa7e222bd397032fd3b6

    • Size

      33KB

    • MD5

      0bbe595239248689d067d0b9bbb5a9f1

    • SHA1

      109b0e1107d3ae3f11d5b694c879d9182f628981

    • SHA256

      be60e144839cea58ccae7e4f59df7ae460a857650a9dfa7e222bd397032fd3b6

    • SHA512

      f0eab1cf71a6458c3daba629200c37c1cd3fa45c01f2d1946208ba5fd203bc43564f14fe901f9a6b8546b59cb2cd85ba66f410ea46c822a61e082573368d22ef

    • SSDEEP

      768:gp2Oj/4UIYwXRBs9kEGcXi0fgn8rnkCCI:gp2GXIdRBcGcX73

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks