General

  • Target

    36eda00d9406683d731e292d5cf0823630b680f223d6579d33c3c4e70f1b2977

  • Size

    1.0MB

  • Sample

    221127-kc87hace22

  • MD5

    a8565007fd4d90c117616255cdbbefb1

  • SHA1

    2c7e3caf11801204da6e14bdf4b9dedc8a67b82a

  • SHA256

    36eda00d9406683d731e292d5cf0823630b680f223d6579d33c3c4e70f1b2977

  • SHA512

    a3d01f6beaaae24a2819428464317f7199294a4558ae3754556eb9bc77ea7452779bf58d4249b76b0deb4cbd326f17800d8640c48ed1a894605dafc863bb9d77

  • SSDEEP

    24576:ylafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:yaANaRGRpuHetmGimZ

Score
7/10

Malware Config

Targets

    • Target

      36eda00d9406683d731e292d5cf0823630b680f223d6579d33c3c4e70f1b2977

    • Size

      1.0MB

    • MD5

      a8565007fd4d90c117616255cdbbefb1

    • SHA1

      2c7e3caf11801204da6e14bdf4b9dedc8a67b82a

    • SHA256

      36eda00d9406683d731e292d5cf0823630b680f223d6579d33c3c4e70f1b2977

    • SHA512

      a3d01f6beaaae24a2819428464317f7199294a4558ae3754556eb9bc77ea7452779bf58d4249b76b0deb4cbd326f17800d8640c48ed1a894605dafc863bb9d77

    • SSDEEP

      24576:ylafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:yaANaRGRpuHetmGimZ

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks