General

  • Target

    bb28cea3a443789b133411739b73dc9e87a3185a65515fa49e5a244401378731

  • Size

    372KB

  • Sample

    221123-ltrjfsff9t

  • MD5

    08c96cc79f08919e8c6bf1eba9fbc685

  • SHA1

    780fbf240b119c3a1890911a7dba2129c1988c19

  • SHA256

    bb28cea3a443789b133411739b73dc9e87a3185a65515fa49e5a244401378731

  • SHA512

    ca58453c1dde064a3d811b0431eb259532b8d2bc3cb3e92188b0a426d208094f7b7137325407f049807b421d10c65b985cf853a989f0970f5e3b3e1a08d84674

  • SSDEEP

    6144:poNqRBhws9Hs7t1kEk1JgYtZCQ8aVVqFsHSWMUIqabCw1oMgzX:poYRB9M781KXanCslfaOMS

Score
6/10

Malware Config

Targets

    • Target

      bb28cea3a443789b133411739b73dc9e87a3185a65515fa49e5a244401378731

    • Size

      372KB

    • MD5

      08c96cc79f08919e8c6bf1eba9fbc685

    • SHA1

      780fbf240b119c3a1890911a7dba2129c1988c19

    • SHA256

      bb28cea3a443789b133411739b73dc9e87a3185a65515fa49e5a244401378731

    • SHA512

      ca58453c1dde064a3d811b0431eb259532b8d2bc3cb3e92188b0a426d208094f7b7137325407f049807b421d10c65b985cf853a989f0970f5e3b3e1a08d84674

    • SSDEEP

      6144:poNqRBhws9Hs7t1kEk1JgYtZCQ8aVVqFsHSWMUIqabCw1oMgzX:poYRB9M781KXanCslfaOMS

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks