General

  • Target

    93e3b7b6d130221c9c8c7b0952890014556bcc35cdb0988fbf09a409a2eb0612

  • Size

    32KB

  • Sample

    221107-y79neaaeak

  • MD5

    0b331b1adcfdd81eac54351958cd90a8

  • SHA1

    b66c29d5c00f8259ee884b9810220d15aa7f9eb6

  • SHA256

    93e3b7b6d130221c9c8c7b0952890014556bcc35cdb0988fbf09a409a2eb0612

  • SHA512

    4227638b38af4b368ae12df7e2b0744bbed313fa19aeb6feec7009c0ebf049f5ce22818ff022e343e622bc715d1e1433062f9e0da4fdea58a985eac63d0441d6

  • SSDEEP

    768:d+GSKgFDVxnBTxa1V+mlcpfLYu3FitHUbt5At61Vp:d+GSKgNBVIV5liTP3Fit0IteV

Score
6/10

Malware Config

Targets

    • Target

      93e3b7b6d130221c9c8c7b0952890014556bcc35cdb0988fbf09a409a2eb0612

    • Size

      32KB

    • MD5

      0b331b1adcfdd81eac54351958cd90a8

    • SHA1

      b66c29d5c00f8259ee884b9810220d15aa7f9eb6

    • SHA256

      93e3b7b6d130221c9c8c7b0952890014556bcc35cdb0988fbf09a409a2eb0612

    • SHA512

      4227638b38af4b368ae12df7e2b0744bbed313fa19aeb6feec7009c0ebf049f5ce22818ff022e343e622bc715d1e1433062f9e0da4fdea58a985eac63d0441d6

    • SSDEEP

      768:d+GSKgFDVxnBTxa1V+mlcpfLYu3FitHUbt5At61Vp:d+GSKgNBVIV5liTP3Fit0IteV

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks