General

  • Target

    69fa4046755264d748b6f230408ceb67494e7a1b301a83529d0549c01c5f0e45

  • Size

    1.0MB

  • Sample

    221127-kbpfpscd28

  • MD5

    28b89a1bb1d806767973a42aaa3eb892

  • SHA1

    8c3b01836416b01230fd4157324ade3a5bc56d6b

  • SHA256

    69fa4046755264d748b6f230408ceb67494e7a1b301a83529d0549c01c5f0e45

  • SHA512

    c99e9845f5b125bbe8e8f16d5ed771b21e9fb2c46d6734389276cf1deb0566449803ea92b18dde82b70f0e2d776a5fac9f7b3359d1a52bed5b276e6332394e0c

  • SSDEEP

    24576:ylafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:yaANaRGRpuHetmGimZ

Score
7/10

Malware Config

Targets

    • Target

      69fa4046755264d748b6f230408ceb67494e7a1b301a83529d0549c01c5f0e45

    • Size

      1.0MB

    • MD5

      28b89a1bb1d806767973a42aaa3eb892

    • SHA1

      8c3b01836416b01230fd4157324ade3a5bc56d6b

    • SHA256

      69fa4046755264d748b6f230408ceb67494e7a1b301a83529d0549c01c5f0e45

    • SHA512

      c99e9845f5b125bbe8e8f16d5ed771b21e9fb2c46d6734389276cf1deb0566449803ea92b18dde82b70f0e2d776a5fac9f7b3359d1a52bed5b276e6332394e0c

    • SSDEEP

      24576:ylafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:yaANaRGRpuHetmGimZ

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks