General

  • Target

    44ba07a4ff4621693424de7b1d11324b

  • Size

    3.1MB

  • Sample

    240105-3pnqfadhd6

  • MD5

    44ba07a4ff4621693424de7b1d11324b

  • SHA1

    1a02e93b5c780402967624192842a2b38fa9343b

  • SHA256

    249b730b3998aa1e3799104651203a5c3ee99edf00c1a54e67675964f032639a

  • SHA512

    bbd1f60e643bf17b7272b0b3c996bd8a6b40691ce78e2cf0be77a9d80b60f531001486415410229c5485123942c0e6254da20e982b538d5518c7c4b1eb05b50e

  • SSDEEP

    49152:z9Ih6OCiyGnhSyhxPw0Pelu8G5UozmzY7KqMFkQDnUt47tS83jVLxwY4sT:z99xJGhSyFPeoVOoHXu/nUt4EAZeYd

Score
8/10

Malware Config

Targets

    • Target

      44ba07a4ff4621693424de7b1d11324b

    • Size

      3.1MB

    • MD5

      44ba07a4ff4621693424de7b1d11324b

    • SHA1

      1a02e93b5c780402967624192842a2b38fa9343b

    • SHA256

      249b730b3998aa1e3799104651203a5c3ee99edf00c1a54e67675964f032639a

    • SHA512

      bbd1f60e643bf17b7272b0b3c996bd8a6b40691ce78e2cf0be77a9d80b60f531001486415410229c5485123942c0e6254da20e982b538d5518c7c4b1eb05b50e

    • SSDEEP

      49152:z9Ih6OCiyGnhSyhxPw0Pelu8G5UozmzY7KqMFkQDnUt47tS83jVLxwY4sT:z99xJGhSyFPeoVOoHXu/nUt4EAZeYd

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks