General

  • Target

    e86a0c599615a5337b43eddabbefe30e249f254cc489bfa7d1e6b0f80cf5826a

  • Size

    935KB

  • Sample

    221125-hlhd2ace9y

  • MD5

    440aa14d1440a4424e4353e2e1e4b4c9

  • SHA1

    8cdee16a670a295a2906abcbc35400ac4c301ed7

  • SHA256

    e86a0c599615a5337b43eddabbefe30e249f254cc489bfa7d1e6b0f80cf5826a

  • SHA512

    98b8cfed4baf829216e7a5369296c20e7e5377e480c511b2cf9e5c51eb81b018b2d29fc1891f2d1fa9a95f481cbce16f4f3bb04cb1512ae92f52c89bbe1f6783

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4I:5yHv5Z+Wzv7AiBll0OBWi6si9G1

Score
8/10
upx

Malware Config

Targets

    • Target

      e86a0c599615a5337b43eddabbefe30e249f254cc489bfa7d1e6b0f80cf5826a

    • Size

      935KB

    • MD5

      440aa14d1440a4424e4353e2e1e4b4c9

    • SHA1

      8cdee16a670a295a2906abcbc35400ac4c301ed7

    • SHA256

      e86a0c599615a5337b43eddabbefe30e249f254cc489bfa7d1e6b0f80cf5826a

    • SHA512

      98b8cfed4baf829216e7a5369296c20e7e5377e480c511b2cf9e5c51eb81b018b2d29fc1891f2d1fa9a95f481cbce16f4f3bb04cb1512ae92f52c89bbe1f6783

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4I:5yHv5Z+Wzv7AiBll0OBWi6si9G1

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks