General

  • Target

    e82b6724441fe69cb4706c179cc72b28642172664436480c3399336ae8034310

  • Size

    931KB

  • Sample

    221125-hlx5gscf3y

  • MD5

    8fe6ce2297665017dc092dd06b7d73c3

  • SHA1

    b06552c341de54d1a2d30f00125d8128b3905709

  • SHA256

    e82b6724441fe69cb4706c179cc72b28642172664436480c3399336ae8034310

  • SHA512

    4d4734474120f4d46ce3c8129bef16ad3278e47e6217d3fe08529c233879a93a40dfa3e2389f2e0f0a338a3f6c27e07b9cd8fb80c7827663bedf0b34b0af2310

  • SSDEEP

    24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKg:C6j19rut7FoU56i

Score
8/10
upx

Malware Config

Targets

    • Target

      e82b6724441fe69cb4706c179cc72b28642172664436480c3399336ae8034310

    • Size

      931KB

    • MD5

      8fe6ce2297665017dc092dd06b7d73c3

    • SHA1

      b06552c341de54d1a2d30f00125d8128b3905709

    • SHA256

      e82b6724441fe69cb4706c179cc72b28642172664436480c3399336ae8034310

    • SHA512

      4d4734474120f4d46ce3c8129bef16ad3278e47e6217d3fe08529c233879a93a40dfa3e2389f2e0f0a338a3f6c27e07b9cd8fb80c7827663bedf0b34b0af2310

    • SSDEEP

      24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKg:C6j19rut7FoU56i

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks