General

  • Target

    a7b0979f5eda8b6f92ed2b19a17bc98070a1cd65cdbc341c4e144bdd7fa42554.zip

  • Size

    155KB

  • Sample

    221123-sp2l7abh53

  • MD5

    b450c971c553e65a60f9035512c75458

  • SHA1

    3992631cbd03b88b71e8739642e2781811876020

  • SHA256

    68c132e9cf44abb65c9a5d0c329adddd4cc1a8439ae5ce33497b0acb2636363e

  • SHA512

    dcf714b25fd5fbff99bbd575d7970b7baf9fc7d0f159a24d4fc080e04ce19015a338b46c92bc66af3c912e6e5f97a63b1ffc66638a69f67ca8f10367ba061c2a

  • SSDEEP

    3072:1Wa2T9F4xU6i787o+v2MDVSUq4ylyBge9Z3NJ8xd1inBXc/I1yHMB:1WtJF4e6i7R+vdVLmebwd14BOIYHMB

Score
8/10

Malware Config

Targets

    • Target

      a7b0979f5eda8b6f92ed2b19a17bc98070a1cd65cdbc341c4e144bdd7fa42554

    • Size

      415KB

    • MD5

      a79d4cdd8a139f9ecef823bb4c690bd9

    • SHA1

      ff8a4efe25e6cd367b32133a04a4ddcd601be259

    • SHA256

      a7b0979f5eda8b6f92ed2b19a17bc98070a1cd65cdbc341c4e144bdd7fa42554

    • SHA512

      6cc15ade8c20961a47d1154b8dbeb94fd3c861c483711a20fafe3d5b32c8ef75d31a31e085c0b9060a359d76a7342ea02635e71551885de416719fb199b4330e

    • SSDEEP

      12288:sU53c6tp1PxdHUQgp/HHbG6lfy+NMYWJ1m+yOFF+jfQyGYdbpYoq:sU5tm+PFgj3lYoq

    Score
    8/10
    • Adds policy Run key to start application

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks