General

  • Target

    e0c8e442cce37ac2b929190966137bcc1847cc5c167c994d822a3840c6eb073f

  • Size

    224KB

  • Sample

    221123-p4wspsda33

  • MD5

    dc3c960985083216433782aac7c84201

  • SHA1

    23cf193a460b8adccb265e607acab461b42924f6

  • SHA256

    e0c8e442cce37ac2b929190966137bcc1847cc5c167c994d822a3840c6eb073f

  • SHA512

    74c69f4fb3d5262fe3d000c49cc067274e622a783f8badf6492f28760085ae38b7c09f44ffb0705f7dd5ab8f9546382327835eea53bdbe091eee3dda6ed8337c

  • SSDEEP

    3072:Dse5Nb8A4yVhsjixyPc8PdOFpNRauIUah+sYHqlzzgYxe:DseT8A4ohstPd+H3ahoqpgY4

Score
6/10

Malware Config

Targets

    • Target

      e0c8e442cce37ac2b929190966137bcc1847cc5c167c994d822a3840c6eb073f

    • Size

      224KB

    • MD5

      dc3c960985083216433782aac7c84201

    • SHA1

      23cf193a460b8adccb265e607acab461b42924f6

    • SHA256

      e0c8e442cce37ac2b929190966137bcc1847cc5c167c994d822a3840c6eb073f

    • SHA512

      74c69f4fb3d5262fe3d000c49cc067274e622a783f8badf6492f28760085ae38b7c09f44ffb0705f7dd5ab8f9546382327835eea53bdbe091eee3dda6ed8337c

    • SSDEEP

      3072:Dse5Nb8A4yVhsjixyPc8PdOFpNRauIUah+sYHqlzzgYxe:DseT8A4ohstPd+H3ahoqpgY4

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks