General

  • Target

    37b664c15e671de53490b0bc6956114aa981d4b47d268b370558a404fa21f444

  • Size

    40KB

  • Sample

    221202-zees1aca86

  • MD5

    263b20ba964a92defd2697f9ff3dcbb0

  • SHA1

    f9de4bfeb8eef115bb37efc2ddd4abf5aa60ee9e

  • SHA256

    37b664c15e671de53490b0bc6956114aa981d4b47d268b370558a404fa21f444

  • SHA512

    82a32942abe5ffa654f212b6053396dcb84cd4b3a433e2a860beafd335d6374ba126133177b199fb1877697721826904c7026260ea1f0ba43af7e88844a4b61e

  • SSDEEP

    768:Ait48WtPm7XCvho0h0pS1PRm3NxSbN7ng+Y/EKdh:AiQtEmoi1JsGm

Score
6/10

Malware Config

Targets

    • Target

      37b664c15e671de53490b0bc6956114aa981d4b47d268b370558a404fa21f444

    • Size

      40KB

    • MD5

      263b20ba964a92defd2697f9ff3dcbb0

    • SHA1

      f9de4bfeb8eef115bb37efc2ddd4abf5aa60ee9e

    • SHA256

      37b664c15e671de53490b0bc6956114aa981d4b47d268b370558a404fa21f444

    • SHA512

      82a32942abe5ffa654f212b6053396dcb84cd4b3a433e2a860beafd335d6374ba126133177b199fb1877697721826904c7026260ea1f0ba43af7e88844a4b61e

    • SSDEEP

      768:Ait48WtPm7XCvho0h0pS1PRm3NxSbN7ng+Y/EKdh:AiQtEmoi1JsGm

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks