General

  • Target

    1594a56591f13af2e4d37418823e0f3f867a54d8850d79eb6425a924adddcfe8

  • Size

    1.1MB

  • Sample

    221124-gerhpafd9y

  • MD5

    18adae05fea26946abf6a6525aecddeb

  • SHA1

    0751830c56690ffa354168fda614fe935ba1d91a

  • SHA256

    1594a56591f13af2e4d37418823e0f3f867a54d8850d79eb6425a924adddcfe8

  • SHA512

    7889e48d2962304d1150992cb973d88b019e0a42c94a9abb00e08c9a9e8fe7958f707ae3d870b83c910a8031ae7a5206fda3d3e5d37faab2fa5c32735dd3aaf7

  • SSDEEP

    24576:fXB+51WPU9u5Ce2mKqTBPUYLqsYVkmpAXo4OsJdvd7uM6EhHIiG:5+5QP34qFUYfCkmpZtsnvdyXhiG

Score
8/10

Malware Config

Targets

    • Target

      1594a56591f13af2e4d37418823e0f3f867a54d8850d79eb6425a924adddcfe8

    • Size

      1.1MB

    • MD5

      18adae05fea26946abf6a6525aecddeb

    • SHA1

      0751830c56690ffa354168fda614fe935ba1d91a

    • SHA256

      1594a56591f13af2e4d37418823e0f3f867a54d8850d79eb6425a924adddcfe8

    • SHA512

      7889e48d2962304d1150992cb973d88b019e0a42c94a9abb00e08c9a9e8fe7958f707ae3d870b83c910a8031ae7a5206fda3d3e5d37faab2fa5c32735dd3aaf7

    • SSDEEP

      24576:fXB+51WPU9u5Ce2mKqTBPUYLqsYVkmpAXo4OsJdvd7uM6EhHIiG:5+5QP34qFUYfCkmpZtsnvdyXhiG

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks