General

  • Target

    e4b2e387a847912349e355ec891914261658f58c53bcbfe8d2ff44fe0bc16e14

  • Size

    935KB

  • Sample

    221125-hr4jfshf32

  • MD5

    f631ee005c7fbe6b2531cf78aacbcf7a

  • SHA1

    88457e6c034cb30aaca1a4ce2db2257b8fa1658d

  • SHA256

    e4b2e387a847912349e355ec891914261658f58c53bcbfe8d2ff44fe0bc16e14

  • SHA512

    a8137adf07ce7d527a5943a3336aae1de8a7775f57496b8d1ce0d2663e480eac56716ec8c2bbf0632c71c2946bb22b062a334d6df0ba9a6142597e976a9ef03b

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4V:IyHv5Z+Wzv7AiBll0OBWi6si9Go

Score
8/10
upx

Malware Config

Targets

    • Target

      e4b2e387a847912349e355ec891914261658f58c53bcbfe8d2ff44fe0bc16e14

    • Size

      935KB

    • MD5

      f631ee005c7fbe6b2531cf78aacbcf7a

    • SHA1

      88457e6c034cb30aaca1a4ce2db2257b8fa1658d

    • SHA256

      e4b2e387a847912349e355ec891914261658f58c53bcbfe8d2ff44fe0bc16e14

    • SHA512

      a8137adf07ce7d527a5943a3336aae1de8a7775f57496b8d1ce0d2663e480eac56716ec8c2bbf0632c71c2946bb22b062a334d6df0ba9a6142597e976a9ef03b

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4V:IyHv5Z+Wzv7AiBll0OBWi6si9Go

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks