General

  • Target

    3c2610e5cfb17e558719acfb9431659f39a30fcc66ca6a592fcb1ff17c675e9e

  • Size

    5.4MB

  • Sample

    240610-m2kasagc9x

  • MD5

    a6a1c3dfb66ca7af1e1790aefae9dbc6

  • SHA1

    9007c3ff210462512320e4e606eaef7756957306

  • SHA256

    3c2610e5cfb17e558719acfb9431659f39a30fcc66ca6a592fcb1ff17c675e9e

  • SHA512

    75c25426b8dc69f2b3172f0053624d9cd56fcabd72927646c72c308f724bf36ca7f17d5917ad9ac13ffb41d10fc2907077677fdc47e6e5271ed5fbeaa85b0fc6

  • SSDEEP

    98304:rbCRFro1iwjPKFA6J9WIcfqU12rsUY7wNWOSq4lsIR/:r+K17P4AQXcfTcrD+wA/q4Z/

Score
7/10

Malware Config

Targets

    • Target

      3c2610e5cfb17e558719acfb9431659f39a30fcc66ca6a592fcb1ff17c675e9e

    • Size

      5.4MB

    • MD5

      a6a1c3dfb66ca7af1e1790aefae9dbc6

    • SHA1

      9007c3ff210462512320e4e606eaef7756957306

    • SHA256

      3c2610e5cfb17e558719acfb9431659f39a30fcc66ca6a592fcb1ff17c675e9e

    • SHA512

      75c25426b8dc69f2b3172f0053624d9cd56fcabd72927646c72c308f724bf36ca7f17d5917ad9ac13ffb41d10fc2907077677fdc47e6e5271ed5fbeaa85b0fc6

    • SSDEEP

      98304:rbCRFro1iwjPKFA6J9WIcfqU12rsUY7wNWOSq4lsIR/:r+K17P4AQXcfTcrD+wA/q4Z/

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks