General

  • Target

    d94f8d6d8883daead67caf9a1ea1e60fd93e57de76bab7d05c0de61d6a481d96

  • Size

    116KB

  • Sample

    221201-2gzx3abh7z

  • MD5

    22284273db72295e15eae65b5ee11550

  • SHA1

    d1e6fdd81dcd81ba31c66ce07fc87b5cf8dd75e4

  • SHA256

    d94f8d6d8883daead67caf9a1ea1e60fd93e57de76bab7d05c0de61d6a481d96

  • SHA512

    de08c5a15c979ed59fe84dd3e28bdd8153f45700bb028a90e8e550564998702d0fc23705ac79680da4a7d428f0fe87c9c9e12815c1b37e30a33d0ae78607ac7c

  • SSDEEP

    1536:tBVDq0jgVZ9BlnctqohX993bPDQPSH82krZ3D+MSNLItH/15a:XUV7l2qol8Pc82Ez+MSytH/i

Score
6/10

Malware Config

Targets

    • Target

      d94f8d6d8883daead67caf9a1ea1e60fd93e57de76bab7d05c0de61d6a481d96

    • Size

      116KB

    • MD5

      22284273db72295e15eae65b5ee11550

    • SHA1

      d1e6fdd81dcd81ba31c66ce07fc87b5cf8dd75e4

    • SHA256

      d94f8d6d8883daead67caf9a1ea1e60fd93e57de76bab7d05c0de61d6a481d96

    • SHA512

      de08c5a15c979ed59fe84dd3e28bdd8153f45700bb028a90e8e550564998702d0fc23705ac79680da4a7d428f0fe87c9c9e12815c1b37e30a33d0ae78607ac7c

    • SSDEEP

      1536:tBVDq0jgVZ9BlnctqohX993bPDQPSH82krZ3D+MSNLItH/15a:XUV7l2qol8Pc82Ez+MSytH/i

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks