General

  • Target

    1310659c777817b1049c9c792039ea00

  • Size

    1.3MB

  • Sample

    231224-1cvbcafbfq

  • MD5

    1310659c777817b1049c9c792039ea00

  • SHA1

    70e9a10954c13f93745256c1c29c02aaf55423db

  • SHA256

    28c6379c74433081388fc7b7c0ea067c54df2a33436e52c1f3188a5526d7b53f

  • SHA512

    17ca292b9d5482141304db50861675f546f62d7579b54a2caf07f519a0e0c85708ee490665859086c07648c2a84c9180851f6eb12d00456c2846dc7887c7bcad

  • SSDEEP

    24576:MK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8g:B6JpC3RLy41aibAiCE1Ps0a1LKD

Score
7/10

Malware Config

Targets

    • Target

      1310659c777817b1049c9c792039ea00

    • Size

      1.3MB

    • MD5

      1310659c777817b1049c9c792039ea00

    • SHA1

      70e9a10954c13f93745256c1c29c02aaf55423db

    • SHA256

      28c6379c74433081388fc7b7c0ea067c54df2a33436e52c1f3188a5526d7b53f

    • SHA512

      17ca292b9d5482141304db50861675f546f62d7579b54a2caf07f519a0e0c85708ee490665859086c07648c2a84c9180851f6eb12d00456c2846dc7887c7bcad

    • SSDEEP

      24576:MK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8g:B6JpC3RLy41aibAiCE1Ps0a1LKD

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks