General

  • Target

    0eb082c5268f5d6def009abef86510350b58e20c43882c246529860477d64cc4

  • Size

    112KB

  • Sample

    220604-wpg5bsaag7

  • MD5

    7623aee5db5091f7be1128afd257e749

  • SHA1

    3c62076897cac52c4d3a5ed5c8df02e0a3ac34e1

  • SHA256

    0eb082c5268f5d6def009abef86510350b58e20c43882c246529860477d64cc4

  • SHA512

    bcd9a83285523f65c200b9f0e39f8341afca7c4c3bd528ccc948d8b2a0789e4c384eb60c003b45d295bbd45b4733edadd5096e3478b5462345e9fa8b627401ce

Score
8/10
upx

Malware Config

Targets

    • Target

      0eb082c5268f5d6def009abef86510350b58e20c43882c246529860477d64cc4

    • Size

      112KB

    • MD5

      7623aee5db5091f7be1128afd257e749

    • SHA1

      3c62076897cac52c4d3a5ed5c8df02e0a3ac34e1

    • SHA256

      0eb082c5268f5d6def009abef86510350b58e20c43882c246529860477d64cc4

    • SHA512

      bcd9a83285523f65c200b9f0e39f8341afca7c4c3bd528ccc948d8b2a0789e4c384eb60c003b45d295bbd45b4733edadd5096e3478b5462345e9fa8b627401ce

    Score
    8/10
    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks