General

  • Target

    7d6567ea07833036adb85432417dca56c85b954269eeb86768146265813d1517

  • Size

    96KB

  • Sample

    221201-28vgnabb98

  • MD5

    f5e6c619cdda4a5da34d3a5f1fa196f0

  • SHA1

    b1902dd28353f97a3acc41e7f96c3183d823eaa7

  • SHA256

    7d6567ea07833036adb85432417dca56c85b954269eeb86768146265813d1517

  • SHA512

    08a603ea3543f50bc8b923f4531742676f60dd5036112678235a8f0ba6134e8dc0b7925f038a31640a024a0497aa33afb2a3bccb4411a7d95367ac5fd682d202

  • SSDEEP

    1536:eD62zryFv8kQFjzITs7P4cCKqBZBATdyV5WYlwwj0:yZzrxkMH+s7AzZBAhyV5WIpo

Score
6/10

Malware Config

Targets

    • Target

      7d6567ea07833036adb85432417dca56c85b954269eeb86768146265813d1517

    • Size

      96KB

    • MD5

      f5e6c619cdda4a5da34d3a5f1fa196f0

    • SHA1

      b1902dd28353f97a3acc41e7f96c3183d823eaa7

    • SHA256

      7d6567ea07833036adb85432417dca56c85b954269eeb86768146265813d1517

    • SHA512

      08a603ea3543f50bc8b923f4531742676f60dd5036112678235a8f0ba6134e8dc0b7925f038a31640a024a0497aa33afb2a3bccb4411a7d95367ac5fd682d202

    • SSDEEP

      1536:eD62zryFv8kQFjzITs7P4cCKqBZBATdyV5WYlwwj0:yZzrxkMH+s7AzZBAhyV5WIpo

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks