General

  • Target

    4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301

  • Size

    35KB

  • Sample

    221123-xbw7rsee58

  • MD5

    5071b60a51b5483675c21db3cade8ef0

  • SHA1

    b119aef357e508473d9c6f7d00cd210969bec527

  • SHA256

    4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301

  • SHA512

    c31b329dea25a85f5a001d4c02cc6a60d4510f546d21ce73fc4a7e2bd5c6c071979b2ca8eea72e1ddd3136bfc2522b279b46d9f625fb33ab47c3639ad528bbae

  • SSDEEP

    768:cL0DgpwJ1xm9VMg6XsoQxxB8uF8zBYAhvi:c1wJ1095xxW28CJ

Score
6/10

Malware Config

Targets

    • Target

      4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301

    • Size

      35KB

    • MD5

      5071b60a51b5483675c21db3cade8ef0

    • SHA1

      b119aef357e508473d9c6f7d00cd210969bec527

    • SHA256

      4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301

    • SHA512

      c31b329dea25a85f5a001d4c02cc6a60d4510f546d21ce73fc4a7e2bd5c6c071979b2ca8eea72e1ddd3136bfc2522b279b46d9f625fb33ab47c3639ad528bbae

    • SSDEEP

      768:cL0DgpwJ1xm9VMg6XsoQxxB8uF8zBYAhvi:c1wJ1095xxW28CJ

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks