General

  • Target

    auto.exe

  • Size

    34.1MB

  • Sample

    230523-nsbgysfa87

  • MD5

    4f6def9c41b63b4beb6ca86ab14255aa

  • SHA1

    4bd8e983a45a670973083a1ef7ee9e08378c0901

  • SHA256

    7ba25c05ac56cdc7c03260d8946d4020604ec11a2a022a68c3d29823e2aa7100

  • SHA512

    a8d1c5f06df113e6096d187af8f9e470af3ed2231e9af4225fdf608df375823d50b23354743d317e41d5b9ebdc026b792027c039a3a9e5c581a4a8fa9371d536

  • SSDEEP

    786432:ekbQ5/ZiiCKIL3lYVsiAqGmQpZYhsIJU47GbANC4MvDOjzgNX:s5xiips347/22JU4APDm0N

Score
7/10

Malware Config

Targets

    • Target

      auto.exe

    • Size

      34.1MB

    • MD5

      4f6def9c41b63b4beb6ca86ab14255aa

    • SHA1

      4bd8e983a45a670973083a1ef7ee9e08378c0901

    • SHA256

      7ba25c05ac56cdc7c03260d8946d4020604ec11a2a022a68c3d29823e2aa7100

    • SHA512

      a8d1c5f06df113e6096d187af8f9e470af3ed2231e9af4225fdf608df375823d50b23354743d317e41d5b9ebdc026b792027c039a3a9e5c581a4a8fa9371d536

    • SSDEEP

      786432:ekbQ5/ZiiCKIL3lYVsiAqGmQpZYhsIJU47GbANC4MvDOjzgNX:s5xiips347/22JU4APDm0N

    Score
    7/10
    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks