General

  • Target

    864f45163d3c13171796c748ade64a71711addfa883f02263005a3d4fe20b222

  • Size

    96KB

  • Sample

    221201-26wlyaec2t

  • MD5

    538e6af19f32ab2f07c61db3852e1ea0

  • SHA1

    482c7d6e3571a030bc09a8a37642e9b3bc68e0d3

  • SHA256

    864f45163d3c13171796c748ade64a71711addfa883f02263005a3d4fe20b222

  • SHA512

    50bf530f14f82c577bb1391dce51467a205eee1f7a8e59b6f906f9eb11ee387de040d066cfe65a58748b132a5443f26b1c6b40ec85cc7a5da20d08dff1731bea

  • SSDEEP

    1536:E6H6lIj0PMlo35oWO8LyTw6BK0fy9V3bcora4b9i:E9lFS78Ow6BKGyV3bcora4bM

Score
6/10

Malware Config

Targets

    • Target

      864f45163d3c13171796c748ade64a71711addfa883f02263005a3d4fe20b222

    • Size

      96KB

    • MD5

      538e6af19f32ab2f07c61db3852e1ea0

    • SHA1

      482c7d6e3571a030bc09a8a37642e9b3bc68e0d3

    • SHA256

      864f45163d3c13171796c748ade64a71711addfa883f02263005a3d4fe20b222

    • SHA512

      50bf530f14f82c577bb1391dce51467a205eee1f7a8e59b6f906f9eb11ee387de040d066cfe65a58748b132a5443f26b1c6b40ec85cc7a5da20d08dff1731bea

    • SSDEEP

      1536:E6H6lIj0PMlo35oWO8LyTw6BK0fy9V3bcora4b9i:E9lFS78Ow6BKGyV3bcora4bM

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks