General

  • Target

    e54e8cec10188bdf4f1a406f896fdee58e6b7eca920b8fd0a76f93559a819f6c

  • Size

    935KB

  • Sample

    221125-hqv6pahe43

  • MD5

    e4c43410a8da7ad014ceefd3c22ed4b5

  • SHA1

    2850b027defb913b957933c954ac22420c2947ce

  • SHA256

    e54e8cec10188bdf4f1a406f896fdee58e6b7eca920b8fd0a76f93559a819f6c

  • SHA512

    2c5ba684f547501a1cd8ebddd9a9abba5a3490e637589e646451fd6b1cdac3937fe36c5eda6bbe699c5cdd7e3d15f7eddbb99dbc7bd88e31c7d2248bfc826463

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:oyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      e54e8cec10188bdf4f1a406f896fdee58e6b7eca920b8fd0a76f93559a819f6c

    • Size

      935KB

    • MD5

      e4c43410a8da7ad014ceefd3c22ed4b5

    • SHA1

      2850b027defb913b957933c954ac22420c2947ce

    • SHA256

      e54e8cec10188bdf4f1a406f896fdee58e6b7eca920b8fd0a76f93559a819f6c

    • SHA512

      2c5ba684f547501a1cd8ebddd9a9abba5a3490e637589e646451fd6b1cdac3937fe36c5eda6bbe699c5cdd7e3d15f7eddbb99dbc7bd88e31c7d2248bfc826463

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:oyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks