General

  • Target

    7d025658421844c75a8223ff73662c0f43df038b676be207be0c569ab3caa899

  • Size

    44KB

  • Sample

    221201-c45z6agb38

  • MD5

    843698de04730bcc6b72c9c6f50de200

  • SHA1

    44692761cd6ad53032d36824bce994833194a870

  • SHA256

    7d025658421844c75a8223ff73662c0f43df038b676be207be0c569ab3caa899

  • SHA512

    13f43c5c34aa39c46955374921467608521f676b0f4b8156467266f24a11ecacb350f0733e30b4040af0142497bdc06b92ca771ce9f137b56bafd714831badcc

  • SSDEEP

    768:6ie4lTtzRvva69hbH6TJrgGBT44F/LIpOLW0y0lKAdk:6ie4lhzRvvaIH6NrgY44F/LK7zQKAdk

Score
6/10

Malware Config

Targets

    • Target

      7d025658421844c75a8223ff73662c0f43df038b676be207be0c569ab3caa899

    • Size

      44KB

    • MD5

      843698de04730bcc6b72c9c6f50de200

    • SHA1

      44692761cd6ad53032d36824bce994833194a870

    • SHA256

      7d025658421844c75a8223ff73662c0f43df038b676be207be0c569ab3caa899

    • SHA512

      13f43c5c34aa39c46955374921467608521f676b0f4b8156467266f24a11ecacb350f0733e30b4040af0142497bdc06b92ca771ce9f137b56bafd714831badcc

    • SSDEEP

      768:6ie4lTtzRvva69hbH6TJrgGBT44F/LIpOLW0y0lKAdk:6ie4lhzRvvaIH6NrgY44F/LK7zQKAdk

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks