General

  • Target

    49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0

  • Size

    1.0MB

  • Sample

    221127-rcplescf24

  • MD5

    010232a4ce486ecb2e65cec23a4d2d31

  • SHA1

    99ca201ae71cf2592fd0c39a9dda3f6760c3bc0f

  • SHA256

    49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0

  • SHA512

    596d38c90eeee739b365fc2626147fb75539159ddb944ab91491fc3fa2e59543ed00651c303c666610c0c40ec8445cf813ba20aafdd92c15cd63557f659908e9

  • SSDEEP

    24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A:A0guUuT/asgU

Score
7/10

Malware Config

Targets

    • Target

      49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0

    • Size

      1.0MB

    • MD5

      010232a4ce486ecb2e65cec23a4d2d31

    • SHA1

      99ca201ae71cf2592fd0c39a9dda3f6760c3bc0f

    • SHA256

      49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0

    • SHA512

      596d38c90eeee739b365fc2626147fb75539159ddb944ab91491fc3fa2e59543ed00651c303c666610c0c40ec8445cf813ba20aafdd92c15cd63557f659908e9

    • SSDEEP

      24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A:A0guUuT/asgU

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks