General

  • Target

    e64f3ec7de977e17873e0b0b7e7717525790e0848b57f7f2232aeda854d13e7e

  • Size

    935KB

  • Sample

    221125-hpfplshd44

  • MD5

    8d65249da05d8b30d30576c9306c7e98

  • SHA1

    50d2fd24e32e1468a21ac6667cf0db8b3e8ad117

  • SHA256

    e64f3ec7de977e17873e0b0b7e7717525790e0848b57f7f2232aeda854d13e7e

  • SHA512

    820ca9f724afbf2b8318e51a1d810ead98ef32234fab12c870c509b774a8e32cd4264d0169dd680db011a7f5fbdcde5cd87a7703caee7302cba208a8e20acf80

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:5yHv5Z+Wzv7AiBll0OBWi6si9Gu

Score
8/10
upx

Malware Config

Targets

    • Target

      e64f3ec7de977e17873e0b0b7e7717525790e0848b57f7f2232aeda854d13e7e

    • Size

      935KB

    • MD5

      8d65249da05d8b30d30576c9306c7e98

    • SHA1

      50d2fd24e32e1468a21ac6667cf0db8b3e8ad117

    • SHA256

      e64f3ec7de977e17873e0b0b7e7717525790e0848b57f7f2232aeda854d13e7e

    • SHA512

      820ca9f724afbf2b8318e51a1d810ead98ef32234fab12c870c509b774a8e32cd4264d0169dd680db011a7f5fbdcde5cd87a7703caee7302cba208a8e20acf80

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:5yHv5Z+Wzv7AiBll0OBWi6si9Gu

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks