General

  • Target

    d15b157d249fea04620a2a03d548d8d6314cd62671226747a5f349e624be6dbe

  • Size

    52KB

  • Sample

    221123-tap6aage9t

  • MD5

    5e16b3c0cebd62a43c671236dfd69fa0

  • SHA1

    0d713d596d5e8d7e3cfcabe76ab6d192ef0d1217

  • SHA256

    d15b157d249fea04620a2a03d548d8d6314cd62671226747a5f349e624be6dbe

  • SHA512

    3aa5b1b48b814414ab47b155204a7ee8223f99698a3652341c0094b115e97c9483e37d30c9f5c6461365c3a7de12b76818af00c16eb999bfbf8424c1556d622d

  • SSDEEP

    768:HtO9giCXrPzrtWnymy45vE/iELf8NqP0oGEUPpunuja4PFiBEWP8lPU2dT:H49MXTIymy4Ob+20oSuu9i60qT

Score
6/10

Malware Config

Targets

    • Target

      d15b157d249fea04620a2a03d548d8d6314cd62671226747a5f349e624be6dbe

    • Size

      52KB

    • MD5

      5e16b3c0cebd62a43c671236dfd69fa0

    • SHA1

      0d713d596d5e8d7e3cfcabe76ab6d192ef0d1217

    • SHA256

      d15b157d249fea04620a2a03d548d8d6314cd62671226747a5f349e624be6dbe

    • SHA512

      3aa5b1b48b814414ab47b155204a7ee8223f99698a3652341c0094b115e97c9483e37d30c9f5c6461365c3a7de12b76818af00c16eb999bfbf8424c1556d622d

    • SSDEEP

      768:HtO9giCXrPzrtWnymy45vE/iELf8NqP0oGEUPpunuja4PFiBEWP8lPU2dT:H49MXTIymy4Ob+20oSuu9i60qT

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks