General

  • Target

    bb64e650e4d5f7f7a1341769b51268deb2751532f8d599478ecc79dc04f20ff4

  • Size

    1.1MB

  • Sample

    221126-t44wjaca5z

  • MD5

    bad28a0162a980a1e1917bb419f6b624

  • SHA1

    1803eca5a8921460241e3974ce50dcc48fa0928a

  • SHA256

    bb64e650e4d5f7f7a1341769b51268deb2751532f8d599478ecc79dc04f20ff4

  • SHA512

    26314c10bec27b0359c342f10ffbb7d92120722cdd68f2720e2fa1196375e58acce147f144bfa258644b24a207e65d9faea742a6be63fdad44cffedaac2496fa

  • SSDEEP

    24576:z8vLvb1yMby1E51gyoMD/9+rSOPTW8pr:zWtbKELB6rhW8h

Score
7/10

Malware Config

Targets

    • Target

      bb64e650e4d5f7f7a1341769b51268deb2751532f8d599478ecc79dc04f20ff4

    • Size

      1.1MB

    • MD5

      bad28a0162a980a1e1917bb419f6b624

    • SHA1

      1803eca5a8921460241e3974ce50dcc48fa0928a

    • SHA256

      bb64e650e4d5f7f7a1341769b51268deb2751532f8d599478ecc79dc04f20ff4

    • SHA512

      26314c10bec27b0359c342f10ffbb7d92120722cdd68f2720e2fa1196375e58acce147f144bfa258644b24a207e65d9faea742a6be63fdad44cffedaac2496fa

    • SSDEEP

      24576:z8vLvb1yMby1E51gyoMD/9+rSOPTW8pr:zWtbKELB6rhW8h

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks