General

  • Target

    6f90448948173daeff012b3a0b1fae40N

  • Size

    9.9MB

  • Sample

    240911-wtngxavhme

  • MD5

    6f90448948173daeff012b3a0b1fae40

  • SHA1

    0251ca8f9f0ae46b2d7e05bbf2589e02ba625c98

  • SHA256

    7907b91848546b664bf2029fc46f9bf35f429019dd1189324b57a39bf826fc68

  • SHA512

    314a1b33d8690263435f518b546abedcf3e4d5c854bee8006a5f0a530571b52c4c4ade06c3e74c7b1ef5286720b677bb9763090c858bb4dd6b28eee2324967e6

  • SSDEEP

    98304:ENH57vTrdT25v0rw/kilZtuncGu/Vw0wen+:aHx1zG+

Score
7/10

Malware Config

Targets

    • Target

      6f90448948173daeff012b3a0b1fae40N

    • Size

      9.9MB

    • MD5

      6f90448948173daeff012b3a0b1fae40

    • SHA1

      0251ca8f9f0ae46b2d7e05bbf2589e02ba625c98

    • SHA256

      7907b91848546b664bf2029fc46f9bf35f429019dd1189324b57a39bf826fc68

    • SHA512

      314a1b33d8690263435f518b546abedcf3e4d5c854bee8006a5f0a530571b52c4c4ade06c3e74c7b1ef5286720b677bb9763090c858bb4dd6b28eee2324967e6

    • SSDEEP

      98304:ENH57vTrdT25v0rw/kilZtuncGu/Vw0wen+:aHx1zG+

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks