General

  • Target

    e4e09ffca027d42ac5b602af96004a06c900a9fdfb1c5bc98a344367123f18b3

  • Size

    935KB

  • Sample

    221125-hrqbtshe86

  • MD5

    5a406195c94b6b705a616cffb849c5ba

  • SHA1

    7446cfe39fbdb7ec4caa4158a7ea28c61e771c37

  • SHA256

    e4e09ffca027d42ac5b602af96004a06c900a9fdfb1c5bc98a344367123f18b3

  • SHA512

    bc6bedba055801262aa729730371021d97415f98d8b2cb0d65375a8d83598b967587ee7247729432282358e5dac9d191dd5fe14a8fc061bc0c58d6a17327d60f

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:pyHv5Z+Wzv7AiBll0OBWi6si9GG

Score
8/10
upx

Malware Config

Targets

    • Target

      e4e09ffca027d42ac5b602af96004a06c900a9fdfb1c5bc98a344367123f18b3

    • Size

      935KB

    • MD5

      5a406195c94b6b705a616cffb849c5ba

    • SHA1

      7446cfe39fbdb7ec4caa4158a7ea28c61e771c37

    • SHA256

      e4e09ffca027d42ac5b602af96004a06c900a9fdfb1c5bc98a344367123f18b3

    • SHA512

      bc6bedba055801262aa729730371021d97415f98d8b2cb0d65375a8d83598b967587ee7247729432282358e5dac9d191dd5fe14a8fc061bc0c58d6a17327d60f

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:pyHv5Z+Wzv7AiBll0OBWi6si9GG

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks