General

  • Target

    e8fa3a25fd504450821386c3bf5f8f21fb6beb803e5f42795de0bbe2782fc64f

  • Size

    935KB

  • Sample

    221125-hkm8wshb23

  • MD5

    cf40f36e109719c223518ec5a76c711c

  • SHA1

    5a0e4273eb4794e54014110590801157e97ccf9e

  • SHA256

    e8fa3a25fd504450821386c3bf5f8f21fb6beb803e5f42795de0bbe2782fc64f

  • SHA512

    a2e51312bd120efcd6b394df1fabf63e6d666dba42126b145b28dc97d2f226c78a9968d926bba30e6189a3391ad6ea0c5b6d414d92822d81e1592e8143e19c9d

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4K:pyHv5Z+Wzv7AiBll0OBWi6si9Gr

Score
8/10
upx

Malware Config

Targets

    • Target

      e8fa3a25fd504450821386c3bf5f8f21fb6beb803e5f42795de0bbe2782fc64f

    • Size

      935KB

    • MD5

      cf40f36e109719c223518ec5a76c711c

    • SHA1

      5a0e4273eb4794e54014110590801157e97ccf9e

    • SHA256

      e8fa3a25fd504450821386c3bf5f8f21fb6beb803e5f42795de0bbe2782fc64f

    • SHA512

      a2e51312bd120efcd6b394df1fabf63e6d666dba42126b145b28dc97d2f226c78a9968d926bba30e6189a3391ad6ea0c5b6d414d92822d81e1592e8143e19c9d

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4K:pyHv5Z+Wzv7AiBll0OBWi6si9Gr

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks