General

  • Target

    e68a32c611f9a5268e4d2f400a8952844313ab12bf263816b5969524f41c1a1f

  • Size

    935KB

  • Sample

    221125-hn4eaacg8y

  • MD5

    477b8e4b8f33e117fb0b9af44ca10deb

  • SHA1

    92c2410c0d6a7f21c76308578b4091fd50f08a8b

  • SHA256

    e68a32c611f9a5268e4d2f400a8952844313ab12bf263816b5969524f41c1a1f

  • SHA512

    fae7c91099d28afd90ece5bc79e038c2f89b453122662bf77f76b0c2eddf12f5c315309c2cf4e2dea4df7a43658bb4f8d33746d9c8d98f3aa147e2c16df6bcd5

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x44:IyHv5Z+Wzv7AiBll0OBWi6si9G5

Score
8/10
upx

Malware Config

Targets

    • Target

      e68a32c611f9a5268e4d2f400a8952844313ab12bf263816b5969524f41c1a1f

    • Size

      935KB

    • MD5

      477b8e4b8f33e117fb0b9af44ca10deb

    • SHA1

      92c2410c0d6a7f21c76308578b4091fd50f08a8b

    • SHA256

      e68a32c611f9a5268e4d2f400a8952844313ab12bf263816b5969524f41c1a1f

    • SHA512

      fae7c91099d28afd90ece5bc79e038c2f89b453122662bf77f76b0c2eddf12f5c315309c2cf4e2dea4df7a43658bb4f8d33746d9c8d98f3aa147e2c16df6bcd5

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x44:IyHv5Z+Wzv7AiBll0OBWi6si9G5

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks