General

  • Target

    3525910b9e78913fae725610a66459b98b131d2e7b60a399a159a60771482b8b

  • Size

    36KB

  • Sample

    221124-aekxkseb92

  • MD5

    16d11f4388896acd15586c926753a3d6

  • SHA1

    f92ebf500902673dcf00367e7401da1bcffefd84

  • SHA256

    3525910b9e78913fae725610a66459b98b131d2e7b60a399a159a60771482b8b

  • SHA512

    8948015894940f058aa80422380bf39e19c341f5ee277c54536660f6cbbcab821568d34463cb1abd488ea2147c0a55869b273ec9f3b53ed5af94daf2ef0ea3d7

  • SSDEEP

    768:9VVoiC+4JDWYA2bwxCVKsN5fAQZV4FJRQNgPl2swrv:90iKWYA2bwxC8kfAYYJGNgtQ

Score
6/10

Malware Config

Targets

    • Target

      3525910b9e78913fae725610a66459b98b131d2e7b60a399a159a60771482b8b

    • Size

      36KB

    • MD5

      16d11f4388896acd15586c926753a3d6

    • SHA1

      f92ebf500902673dcf00367e7401da1bcffefd84

    • SHA256

      3525910b9e78913fae725610a66459b98b131d2e7b60a399a159a60771482b8b

    • SHA512

      8948015894940f058aa80422380bf39e19c341f5ee277c54536660f6cbbcab821568d34463cb1abd488ea2147c0a55869b273ec9f3b53ed5af94daf2ef0ea3d7

    • SSDEEP

      768:9VVoiC+4JDWYA2bwxCVKsN5fAQZV4FJRQNgPl2swrv:90iKWYA2bwxC8kfAYYJGNgtQ

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks