General

  • Target

    e5b12c9e6c81dc4b17bf509a25a596c06729e421dd4faa53367ff9ad265e0191

  • Size

    935KB

  • Sample

    221125-hqcpcach7v

  • MD5

    e3311a764385ab3a608812d5d1ff42c3

  • SHA1

    51ed42c9a44deb17caecb55ac9868ffea87a3051

  • SHA256

    e5b12c9e6c81dc4b17bf509a25a596c06729e421dd4faa53367ff9ad265e0191

  • SHA512

    6e0a167c1bc797b5c53fb72a1ab9d093074da09758a149da154acfee4e16f0772e591bd4a67adc75fdd2fcc82806f39d96c45c5fd052b879f69de92f73e665c4

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4j:JyHv5Z+Wzv7AiBll0OBWi6si9Ga

Score
8/10
upx

Malware Config

Targets

    • Target

      e5b12c9e6c81dc4b17bf509a25a596c06729e421dd4faa53367ff9ad265e0191

    • Size

      935KB

    • MD5

      e3311a764385ab3a608812d5d1ff42c3

    • SHA1

      51ed42c9a44deb17caecb55ac9868ffea87a3051

    • SHA256

      e5b12c9e6c81dc4b17bf509a25a596c06729e421dd4faa53367ff9ad265e0191

    • SHA512

      6e0a167c1bc797b5c53fb72a1ab9d093074da09758a149da154acfee4e16f0772e591bd4a67adc75fdd2fcc82806f39d96c45c5fd052b879f69de92f73e665c4

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4j:JyHv5Z+Wzv7AiBll0OBWi6si9Ga

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks