General

  • Target

    16a322ad43269e7c759cdc11a5fd5c997b23b0f094d2a98551129b68af643cd2

  • Size

    1.0MB

  • Sample

    221127-rpgrcahb9y

  • MD5

    5fd177bd919ee08c0fd60addb14eb60a

  • SHA1

    d97ac977194363d433c28d085303087b5a990dce

  • SHA256

    16a322ad43269e7c759cdc11a5fd5c997b23b0f094d2a98551129b68af643cd2

  • SHA512

    82ad3829097c052bce65f4ced2f32c166ded6f459ecdafda58a9a06500aba300d1e288bb65a256bf8197afc0f3aec199562833cdc0fbb4399558ed3593c4a102

  • SSDEEP

    24576:plcZbTZvSDFbC+IX0RFLlVeUXHPwPzwIRm0m+b+:ploGF5EUXHP8Lb+

Score
7/10

Malware Config

Targets

    • Target

      16a322ad43269e7c759cdc11a5fd5c997b23b0f094d2a98551129b68af643cd2

    • Size

      1.0MB

    • MD5

      5fd177bd919ee08c0fd60addb14eb60a

    • SHA1

      d97ac977194363d433c28d085303087b5a990dce

    • SHA256

      16a322ad43269e7c759cdc11a5fd5c997b23b0f094d2a98551129b68af643cd2

    • SHA512

      82ad3829097c052bce65f4ced2f32c166ded6f459ecdafda58a9a06500aba300d1e288bb65a256bf8197afc0f3aec199562833cdc0fbb4399558ed3593c4a102

    • SSDEEP

      24576:plcZbTZvSDFbC+IX0RFLlVeUXHPwPzwIRm0m+b+:ploGF5EUXHP8Lb+

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks