General

  • Target

    479c309cfa025c8047ba8ddbe77888add86009dbfd1a52d834ec97b760cd4576

  • Size

    45KB

  • Sample

    221124-adx6hseb54

  • MD5

    265d36bae4f8074214ff78dfb06e3ee0

  • SHA1

    d81b9304f52781d5728aff3932605eb66e372261

  • SHA256

    479c309cfa025c8047ba8ddbe77888add86009dbfd1a52d834ec97b760cd4576

  • SHA512

    4f51bae906c7652affd1336bd7a283878d8d075f58617daac5aaa38ab9f4deeaa64b44a86ad06179d79cfe71d2c1b501f9685ac3ab26c672c19e12023ebcf513

  • SSDEEP

    768:frznmlYVoBncebfo/9XnIeaNH4l0AYo7qXJtAk39C49+jYIe3HjOI7d5:frzmlYqZHgBAH+XivAk39CVYF3Hjp5

Score
6/10

Malware Config

Targets

    • Target

      479c309cfa025c8047ba8ddbe77888add86009dbfd1a52d834ec97b760cd4576

    • Size

      45KB

    • MD5

      265d36bae4f8074214ff78dfb06e3ee0

    • SHA1

      d81b9304f52781d5728aff3932605eb66e372261

    • SHA256

      479c309cfa025c8047ba8ddbe77888add86009dbfd1a52d834ec97b760cd4576

    • SHA512

      4f51bae906c7652affd1336bd7a283878d8d075f58617daac5aaa38ab9f4deeaa64b44a86ad06179d79cfe71d2c1b501f9685ac3ab26c672c19e12023ebcf513

    • SSDEEP

      768:frznmlYVoBncebfo/9XnIeaNH4l0AYo7qXJtAk39C49+jYIe3HjOI7d5:frzmlYqZHgBAH+XivAk39CVYF3Hjp5

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks