General

  • Target

    f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f

  • Size

    29KB

  • Sample

    221203-xpa7fsfg63

  • MD5

    084842f73b70a6fe4c06e634d46add40

  • SHA1

    c6d55ff3cd29ce38f3f7ba8eeb56be32a780d4d9

  • SHA256

    f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f

  • SHA512

    cdd13b3f8e0145ba3c4f996513562d6b5128cd7eabfeb6b6c1eb7b5aa2242138666fb0fdadcc59cbf004416641b30f4521d686c5121d8b6d39d847e411b88aa2

  • SSDEEP

    768:KOwHtOnvWqkvgYSAbp1+wbsCvfi7iNOMwq430:KOM0WHvbRjbpv0130

Score
6/10

Malware Config

Targets

    • Target

      f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f

    • Size

      29KB

    • MD5

      084842f73b70a6fe4c06e634d46add40

    • SHA1

      c6d55ff3cd29ce38f3f7ba8eeb56be32a780d4d9

    • SHA256

      f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f

    • SHA512

      cdd13b3f8e0145ba3c4f996513562d6b5128cd7eabfeb6b6c1eb7b5aa2242138666fb0fdadcc59cbf004416641b30f4521d686c5121d8b6d39d847e411b88aa2

    • SSDEEP

      768:KOwHtOnvWqkvgYSAbp1+wbsCvfi7iNOMwq430:KOM0WHvbRjbpv0130

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks