General

  • Target

    bedc4073ec0e38ee8a9e2f04dcace561

  • Size

    214KB

  • Sample

    240310-rz9j4seg31

  • MD5

    bedc4073ec0e38ee8a9e2f04dcace561

  • SHA1

    8d95179f6be220cee5d482a53e999d8870a69f50

  • SHA256

    e5c70f7cfb54d0bb0157eef3c98dca31e8ff2a183222c1fde8a13265b1613cf3

  • SHA512

    fd895c4baea7ce165c6a3cc109d7fabc154fb60f3382a3ebb0ec55977cfc0231472222c96221990550b352910ec79b6aa984654836b96c9f2d12af5518019d04

  • SSDEEP

    3072:b5hb9OE5yxOvWNB4g1PaL6ruDOP57XnRnYQqOGve8T7gt8F8vLqg1cw:TbDWNRgL3SxHqlmy7E8yvLqgyw

Score
6/10

Malware Config

Targets

    • Target

      bedc4073ec0e38ee8a9e2f04dcace561

    • Size

      214KB

    • MD5

      bedc4073ec0e38ee8a9e2f04dcace561

    • SHA1

      8d95179f6be220cee5d482a53e999d8870a69f50

    • SHA256

      e5c70f7cfb54d0bb0157eef3c98dca31e8ff2a183222c1fde8a13265b1613cf3

    • SHA512

      fd895c4baea7ce165c6a3cc109d7fabc154fb60f3382a3ebb0ec55977cfc0231472222c96221990550b352910ec79b6aa984654836b96c9f2d12af5518019d04

    • SSDEEP

      3072:b5hb9OE5yxOvWNB4g1PaL6ruDOP57XnRnYQqOGve8T7gt8F8vLqg1cw:TbDWNRgL3SxHqlmy7E8yvLqgyw

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks