General

  • Target

    c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53

  • Size

    1.0MB

  • Sample

    221127-dp5araac2v

  • MD5

    819e54a57ba6c1866dcf9b2453ee632d

  • SHA1

    0c45b5450467469f82d012b1b42afb0a2fbff69e

  • SHA256

    c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53

  • SHA512

    560cf2eb06b4834a184859e588187b88aad607d81ad17e9214aa49100948543a841f467cdb06f664ba4c854aa18a8f3798c1bf84db8f5a926a869aeb03f1878a

  • SSDEEP

    24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBI:yg+NBOQ9c83D271GS

Score
7/10

Malware Config

Targets

    • Target

      c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53

    • Size

      1.0MB

    • MD5

      819e54a57ba6c1866dcf9b2453ee632d

    • SHA1

      0c45b5450467469f82d012b1b42afb0a2fbff69e

    • SHA256

      c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53

    • SHA512

      560cf2eb06b4834a184859e588187b88aad607d81ad17e9214aa49100948543a841f467cdb06f664ba4c854aa18a8f3798c1bf84db8f5a926a869aeb03f1878a

    • SSDEEP

      24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBI:yg+NBOQ9c83D271GS

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks