General

  • Target

    d2e302d6cbbc9885af458267112ecf9a64b505afdad64d716246ccd6ba517003

  • Size

    60KB

  • Sample

    221129-rxt2msbh5y

  • MD5

    045be9f7caa287685a3aceb00dd4edf0

  • SHA1

    b8baf48fc8a6c37e0978401c96ac0bca0197e2db

  • SHA256

    d2e302d6cbbc9885af458267112ecf9a64b505afdad64d716246ccd6ba517003

  • SHA512

    8d78bfaaae415171214db2d1723a1dd49c8b8e3597dfa40b4cf62437604ec38dc10e9222c9a523c271e91680707c8cfa861c5e6422e16ab0a40a75c0d549bf87

  • SSDEEP

    1536:yKcBA0ZyaCB0Z80f+CuVMRy5BMiO1MGDw125RUs:yKqs1BeF/uKRyRO17DJh

Score
6/10

Malware Config

Targets

    • Target

      d2e302d6cbbc9885af458267112ecf9a64b505afdad64d716246ccd6ba517003

    • Size

      60KB

    • MD5

      045be9f7caa287685a3aceb00dd4edf0

    • SHA1

      b8baf48fc8a6c37e0978401c96ac0bca0197e2db

    • SHA256

      d2e302d6cbbc9885af458267112ecf9a64b505afdad64d716246ccd6ba517003

    • SHA512

      8d78bfaaae415171214db2d1723a1dd49c8b8e3597dfa40b4cf62437604ec38dc10e9222c9a523c271e91680707c8cfa861c5e6422e16ab0a40a75c0d549bf87

    • SSDEEP

      1536:yKcBA0ZyaCB0Z80f+CuVMRy5BMiO1MGDw125RUs:yKqs1BeF/uKRyRO17DJh

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks