General

  • Target

    e51d2350884e29cf3a94b207755fa594bd97bade716fda2eb4f6c9316ff729cc

  • Size

    935KB

  • Sample

    221125-hq9n3she59

  • MD5

    1ef541e601a962551d9ed2180d65e895

  • SHA1

    175cfe29e3243f7272918fa24f12a43b9cedeed3

  • SHA256

    e51d2350884e29cf3a94b207755fa594bd97bade716fda2eb4f6c9316ff729cc

  • SHA512

    082df4f03c91711dbb74066df939c259fab2ea3892d59c98c78c1728592746a15a7afecb8327bfc578f27e1fb49611f394a28767e948ac2b0df94f3ad95d0ebd

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4N:oyHv5Z+Wzv7AiBll0OBWi6si9G8

Score
8/10
upx

Malware Config

Targets

    • Target

      e51d2350884e29cf3a94b207755fa594bd97bade716fda2eb4f6c9316ff729cc

    • Size

      935KB

    • MD5

      1ef541e601a962551d9ed2180d65e895

    • SHA1

      175cfe29e3243f7272918fa24f12a43b9cedeed3

    • SHA256

      e51d2350884e29cf3a94b207755fa594bd97bade716fda2eb4f6c9316ff729cc

    • SHA512

      082df4f03c91711dbb74066df939c259fab2ea3892d59c98c78c1728592746a15a7afecb8327bfc578f27e1fb49611f394a28767e948ac2b0df94f3ad95d0ebd

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4N:oyHv5Z+Wzv7AiBll0OBWi6si9G8

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks