General

  • Target

    6a8576c6b356dc12fa9b934d1a3512723b9aa976256af265af5eb1c047430cbc

  • Size

    40KB

  • Sample

    221107-y9td7sgcg8

  • MD5

    0b908e52ce25a8701af2a9b9ffb1d728

  • SHA1

    6e7adbe084c049b0ab27a3a574286842c3679f18

  • SHA256

    6a8576c6b356dc12fa9b934d1a3512723b9aa976256af265af5eb1c047430cbc

  • SHA512

    e04a1177366e000ad77d9dd7c9679e2119e79c75aac542fa185eb025b2d822d25b0037a4820e655701360ef06d78ea2fe86a7ffbd7f8473afd6a75b581c4f5e0

  • SSDEEP

    768:w6OptTDBeJF5Afwp+j6SR9GuXiQfrn8rnkCC9:w6MPBeJ4fg+j68GuXvH

Score
6/10

Malware Config

Targets

    • Target

      6a8576c6b356dc12fa9b934d1a3512723b9aa976256af265af5eb1c047430cbc

    • Size

      40KB

    • MD5

      0b908e52ce25a8701af2a9b9ffb1d728

    • SHA1

      6e7adbe084c049b0ab27a3a574286842c3679f18

    • SHA256

      6a8576c6b356dc12fa9b934d1a3512723b9aa976256af265af5eb1c047430cbc

    • SHA512

      e04a1177366e000ad77d9dd7c9679e2119e79c75aac542fa185eb025b2d822d25b0037a4820e655701360ef06d78ea2fe86a7ffbd7f8473afd6a75b581c4f5e0

    • SSDEEP

      768:w6OptTDBeJF5Afwp+j6SR9GuXiQfrn8rnkCC9:w6MPBeJ4fg+j68GuXvH

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks