General

  • Target

    63836b8bcbce046a92178bd2a692f28d7e7ba65e41d026465e3d7782003934dd

  • Size

    35KB

  • Sample

    221123-vs7cysch2s

  • MD5

    521604fea8ec8d79c735385fa562bd40

  • SHA1

    b2847cbe91a2be73364f5935312c99caaadbf8d6

  • SHA256

    63836b8bcbce046a92178bd2a692f28d7e7ba65e41d026465e3d7782003934dd

  • SHA512

    83a6a289a57cab837cbc537421dd897dd293ee50b8bd75221da2672c0b0343398a4c5b70388a10407b038495e09a44223015ed74a608aa09016a56d03fd8badf

  • SSDEEP

    768:t3bSr3Ome2Om19VtFtkMI47Jpx9GvhpA8nPWvLerq5y5WcUOpsYsM:t3bYOme2Om19VtFtkMI47PGppA8OvL8b

Score
6/10

Malware Config

Targets

    • Target

      63836b8bcbce046a92178bd2a692f28d7e7ba65e41d026465e3d7782003934dd

    • Size

      35KB

    • MD5

      521604fea8ec8d79c735385fa562bd40

    • SHA1

      b2847cbe91a2be73364f5935312c99caaadbf8d6

    • SHA256

      63836b8bcbce046a92178bd2a692f28d7e7ba65e41d026465e3d7782003934dd

    • SHA512

      83a6a289a57cab837cbc537421dd897dd293ee50b8bd75221da2672c0b0343398a4c5b70388a10407b038495e09a44223015ed74a608aa09016a56d03fd8badf

    • SSDEEP

      768:t3bSr3Ome2Om19VtFtkMI47Jpx9GvhpA8nPWvLerq5y5WcUOpsYsM:t3bYOme2Om19VtFtkMI47PGppA8OvL8b

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks