General

  • Target

    e50a23c88521408a3772486fe3bdb540f30918a006e0b1d3fde7432638bb45a5

  • Size

    935KB

  • Sample

    221125-hrf36ahe68

  • MD5

    2ccf229fbbe3e2c5dbd045869fd65ccf

  • SHA1

    bc1feddce84c8dd0b57ce775838a421e621713ce

  • SHA256

    e50a23c88521408a3772486fe3bdb540f30918a006e0b1d3fde7432638bb45a5

  • SHA512

    6d6187408fd73fe9f7082ff0d8bc173b8a6aac3c3213efbb100782ca644b53a166e1886e5501ff65109a803efc35b7d269f8bca84a8c047641344c42c1545dc5

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x46:pyHv5Z+Wzv7AiBll0OBWi6si9Gn

Score
8/10
upx

Malware Config

Targets

    • Target

      e50a23c88521408a3772486fe3bdb540f30918a006e0b1d3fde7432638bb45a5

    • Size

      935KB

    • MD5

      2ccf229fbbe3e2c5dbd045869fd65ccf

    • SHA1

      bc1feddce84c8dd0b57ce775838a421e621713ce

    • SHA256

      e50a23c88521408a3772486fe3bdb540f30918a006e0b1d3fde7432638bb45a5

    • SHA512

      6d6187408fd73fe9f7082ff0d8bc173b8a6aac3c3213efbb100782ca644b53a166e1886e5501ff65109a803efc35b7d269f8bca84a8c047641344c42c1545dc5

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x46:pyHv5Z+Wzv7AiBll0OBWi6si9Gn

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks