General

  • Target

    e6e9020d9a0742b09125fe5290827b8f10bad2c5b9d3a9cbac794b19f8a909f4

  • Size

    935KB

  • Sample

    221125-hng62scg41

  • MD5

    e99110a09e541a480a1a12380f5ea181

  • SHA1

    62ea16beeea007940ca27329b87033001cfab30c

  • SHA256

    e6e9020d9a0742b09125fe5290827b8f10bad2c5b9d3a9cbac794b19f8a909f4

  • SHA512

    102c120a26ad623a364fc111d44c0a6ad5c779d3986d952493ee39786a94fc00c9a0f287def4fdb23def01a51fd6b36f5a748dcec38bae8a13254c1e3c0b96d4

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4w:5yHv5Z+Wzv7AiBll0OBWi6si9GZ

Score
8/10
upx

Malware Config

Targets

    • Target

      e6e9020d9a0742b09125fe5290827b8f10bad2c5b9d3a9cbac794b19f8a909f4

    • Size

      935KB

    • MD5

      e99110a09e541a480a1a12380f5ea181

    • SHA1

      62ea16beeea007940ca27329b87033001cfab30c

    • SHA256

      e6e9020d9a0742b09125fe5290827b8f10bad2c5b9d3a9cbac794b19f8a909f4

    • SHA512

      102c120a26ad623a364fc111d44c0a6ad5c779d3986d952493ee39786a94fc00c9a0f287def4fdb23def01a51fd6b36f5a748dcec38bae8a13254c1e3c0b96d4

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4w:5yHv5Z+Wzv7AiBll0OBWi6si9GZ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks