General

  • Target

    2d3925f7b82404b53719f5d5fbbd686ebf1a973a5cfd3663eb71df8816dcf546

  • Size

    36KB

  • Sample

    221123-xfxzvseh63

  • MD5

    44822cc990142caeeb2e9b3464cb5a50

  • SHA1

    202c943cd7a95e71612bfd89762273af7d5da694

  • SHA256

    2d3925f7b82404b53719f5d5fbbd686ebf1a973a5cfd3663eb71df8816dcf546

  • SHA512

    32056572b6605f52063815dbe2d6e7d462cf25734fdcff3a9ff624182c1f13ffb71fc166d4c720565c55d107c153511bbb4513bce8b275e3776272de426e1cae

  • SSDEEP

    768:ljNT+6F3G8YasqAaqBKEyoMs6Sug3HdplvnpFxf+SsI:ljNS6ZGKsuqBKE3iSH3HZ

Score
6/10

Malware Config

Targets

    • Target

      2d3925f7b82404b53719f5d5fbbd686ebf1a973a5cfd3663eb71df8816dcf546

    • Size

      36KB

    • MD5

      44822cc990142caeeb2e9b3464cb5a50

    • SHA1

      202c943cd7a95e71612bfd89762273af7d5da694

    • SHA256

      2d3925f7b82404b53719f5d5fbbd686ebf1a973a5cfd3663eb71df8816dcf546

    • SHA512

      32056572b6605f52063815dbe2d6e7d462cf25734fdcff3a9ff624182c1f13ffb71fc166d4c720565c55d107c153511bbb4513bce8b275e3776272de426e1cae

    • SSDEEP

      768:ljNT+6F3G8YasqAaqBKEyoMs6Sug3HdplvnpFxf+SsI:ljNS6ZGKsuqBKE3iSH3HZ

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks