General

  • Target

    ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N

  • Size

    36KB

  • Sample

    241015-dvnvyswdkl

  • MD5

    2c29381e338cdb2292bd31b60c28f4e0

  • SHA1

    d2fbc71b0fb593f9d5489ea90d7916a7e22fa789

  • SHA256

    ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38

  • SHA512

    ade9d38e6ab74f8baa9f7e12f333b5d2315e2f92b18be5e404a9b33075c488038535cc917d9025b91999138d691da66266b0710ba20c084c5680434230fab229

  • SSDEEP

    768:xdf5Jutj/1EUUQbb0xEFxVd42OWSCyidt9n7Lg/+aJMNUzNNlU:xdOtpV4qdRO5riZqusW

Score
6/10

Malware Config

Targets

    • Target

      ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N

    • Size

      36KB

    • MD5

      2c29381e338cdb2292bd31b60c28f4e0

    • SHA1

      d2fbc71b0fb593f9d5489ea90d7916a7e22fa789

    • SHA256

      ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38

    • SHA512

      ade9d38e6ab74f8baa9f7e12f333b5d2315e2f92b18be5e404a9b33075c488038535cc917d9025b91999138d691da66266b0710ba20c084c5680434230fab229

    • SSDEEP

      768:xdf5Jutj/1EUUQbb0xEFxVd42OWSCyidt9n7Lg/+aJMNUzNNlU:xdOtpV4qdRO5riZqusW

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks