General

  • Target

    e871e28a5bbab0d83a0635a0bb11423334318af9c3926ebb865e3782bcdfe3ad

  • Size

    935KB

  • Sample

    221125-hlggqsce9w

  • MD5

    02fd517844a2f382e2dfb17616b6ef45

  • SHA1

    21f7389f6a4d625e17685b91966e597f321330bc

  • SHA256

    e871e28a5bbab0d83a0635a0bb11423334318af9c3926ebb865e3782bcdfe3ad

  • SHA512

    67172027402d3a97157500b05af217187399d08d7fda5e7b42c388b1387188a9eff49876ce07e40f9e21ce6b3f561ba41f6a8cf257c8a9cb5bef14684f91274f

  • SSDEEP

    12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4a:ZyHv5Z+Wzv7AiBll0OBWi6si9Gv

Score
8/10
upx

Malware Config

Targets

    • Target

      e871e28a5bbab0d83a0635a0bb11423334318af9c3926ebb865e3782bcdfe3ad

    • Size

      935KB

    • MD5

      02fd517844a2f382e2dfb17616b6ef45

    • SHA1

      21f7389f6a4d625e17685b91966e597f321330bc

    • SHA256

      e871e28a5bbab0d83a0635a0bb11423334318af9c3926ebb865e3782bcdfe3ad

    • SHA512

      67172027402d3a97157500b05af217187399d08d7fda5e7b42c388b1387188a9eff49876ce07e40f9e21ce6b3f561ba41f6a8cf257c8a9cb5bef14684f91274f

    • SSDEEP

      12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4a:ZyHv5Z+Wzv7AiBll0OBWi6si9Gv

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks