General

  • Target

    e7dd81d68cd5190317cac3a11a2f49046ad745c2d3771ef432d0d76564ed7439

  • Size

    935KB

  • Sample

    221125-hl9hhscf5x

  • MD5

    7e78df95e9e39c2cf7e4f06f032b2877

  • SHA1

    c699ecb604f4f81f858202e42c79b51fbcbbd612

  • SHA256

    e7dd81d68cd5190317cac3a11a2f49046ad745c2d3771ef432d0d76564ed7439

  • SHA512

    bb3654ff887f2e19066972510229691acc6242f8286eadd43b18899021a8b817e66b5b8a0b5d6b4bb7c568b63f64cd4032fcc70b82bb209531160fa1c052394c

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4/:oyHv5Z+Wzv7AiBll0OBWi6si9Ga

Score
8/10
upx

Malware Config

Targets

    • Target

      e7dd81d68cd5190317cac3a11a2f49046ad745c2d3771ef432d0d76564ed7439

    • Size

      935KB

    • MD5

      7e78df95e9e39c2cf7e4f06f032b2877

    • SHA1

      c699ecb604f4f81f858202e42c79b51fbcbbd612

    • SHA256

      e7dd81d68cd5190317cac3a11a2f49046ad745c2d3771ef432d0d76564ed7439

    • SHA512

      bb3654ff887f2e19066972510229691acc6242f8286eadd43b18899021a8b817e66b5b8a0b5d6b4bb7c568b63f64cd4032fcc70b82bb209531160fa1c052394c

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4/:oyHv5Z+Wzv7AiBll0OBWi6si9Ga

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks