General

  • Target

    429f5e55b4c3563925141152183d5cb5

  • Size

    888KB

  • Sample

    240105-dt6z5sghfl

  • MD5

    429f5e55b4c3563925141152183d5cb5

  • SHA1

    d4bd9b6f31fa81a8d090f87e5ee1c9df870968c7

  • SHA256

    12cb21d09f282ff4e26c4d014a941738e4a8583c7459efd65651981b72b5c3ed

  • SHA512

    f03150c29ce784ead7fa54b5ea862eea0c9f71501db8db2d0f0581fa5c20a963649aaa5ef957306e256259a9d6b40b02f19cd105e46ba505f1505303847032f0

  • SSDEEP

    24576:jJqpPpXeJHnKE4sDWtq3tyrkkna9oQyxc:jJ6xXeBN4sStu8rkCay9xc

Score
7/10

Malware Config

Targets

    • Target

      429f5e55b4c3563925141152183d5cb5

    • Size

      888KB

    • MD5

      429f5e55b4c3563925141152183d5cb5

    • SHA1

      d4bd9b6f31fa81a8d090f87e5ee1c9df870968c7

    • SHA256

      12cb21d09f282ff4e26c4d014a941738e4a8583c7459efd65651981b72b5c3ed

    • SHA512

      f03150c29ce784ead7fa54b5ea862eea0c9f71501db8db2d0f0581fa5c20a963649aaa5ef957306e256259a9d6b40b02f19cd105e46ba505f1505303847032f0

    • SSDEEP

      24576:jJqpPpXeJHnKE4sDWtq3tyrkkna9oQyxc:jJ6xXeBN4sStu8rkCay9xc

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks