General

  • Target

    4c2da4163626cfc3f5df2833244f62226e09029b60736efc4d8272d217b0bf1c

  • Size

    828KB

  • Sample

    221126-ey4agseh7y

  • MD5

    177c62e5ce48ab97f565f1912cb46c55

  • SHA1

    7c9822da841e6df900d306d799e460583eb332eb

  • SHA256

    4c2da4163626cfc3f5df2833244f62226e09029b60736efc4d8272d217b0bf1c

  • SHA512

    98e60eb2530aa8717f39dc0cec713c0d8e413fd44eb4aeb2578b7d979ece8a761c638f33a066eb3044d4679ee208b10a9f91ae3fd072b6b9ecfd8b6521e1ba77

  • SSDEEP

    24576:2DFhwFzsQNLAr5bj/b4FKHrJ841gAQguqMwPt:mFhwFzPBYb02y4SA5Mw

Score
7/10

Malware Config

Targets

    • Target

      4c2da4163626cfc3f5df2833244f62226e09029b60736efc4d8272d217b0bf1c

    • Size

      828KB

    • MD5

      177c62e5ce48ab97f565f1912cb46c55

    • SHA1

      7c9822da841e6df900d306d799e460583eb332eb

    • SHA256

      4c2da4163626cfc3f5df2833244f62226e09029b60736efc4d8272d217b0bf1c

    • SHA512

      98e60eb2530aa8717f39dc0cec713c0d8e413fd44eb4aeb2578b7d979ece8a761c638f33a066eb3044d4679ee208b10a9f91ae3fd072b6b9ecfd8b6521e1ba77

    • SSDEEP

      24576:2DFhwFzsQNLAr5bj/b4FKHrJ841gAQguqMwPt:mFhwFzPBYb02y4SA5Mw

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks