General

  • Target

    e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73

  • Size

    931KB

  • Sample

    221125-hnf9racg4z

  • MD5

    4e00922722e0e30b3be9872c52c04293

  • SHA1

    b474ce5d8efd4de88133d92fdb3d86c63d65ba54

  • SHA256

    e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73

  • SHA512

    c5a4b72e852e47eb7af8cffb76586c1316c9b57e797a96a2bdae62ee5b028ad46dc3e9f7a8b52bdc2f627bb5cc22cc714a530613c9e32b015fd548bcca16d94c

  • SSDEEP

    24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

Score
8/10
upx

Malware Config

Targets

    • Target

      e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73

    • Size

      931KB

    • MD5

      4e00922722e0e30b3be9872c52c04293

    • SHA1

      b474ce5d8efd4de88133d92fdb3d86c63d65ba54

    • SHA256

      e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73

    • SHA512

      c5a4b72e852e47eb7af8cffb76586c1316c9b57e797a96a2bdae62ee5b028ad46dc3e9f7a8b52bdc2f627bb5cc22cc714a530613c9e32b015fd548bcca16d94c

    • SSDEEP

      24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks