General

  • Target

    e4dd005be515ad18e4462e1da6e44767fb50ff10d1565a2db93416780225dd17

  • Size

    935KB

  • Sample

    221125-hrrvnahe88

  • MD5

    819625d8241c6b19a959b5af0a6da828

  • SHA1

    29464830fa46a6f3241b671c8fb6f192ca9f65c6

  • SHA256

    e4dd005be515ad18e4462e1da6e44767fb50ff10d1565a2db93416780225dd17

  • SHA512

    cc6030f113b22e4fc406e3e9d0f9f687d8d22bc53416630a965e3112da537ae5aebd22261135dab6297082ff1fcfa6f4ce93cecf56c48d3daccb8fc1fed01449

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:pyHv5Z+Wzv7AiBll0OBWi6si9Gh

Score
8/10
upx

Malware Config

Targets

    • Target

      e4dd005be515ad18e4462e1da6e44767fb50ff10d1565a2db93416780225dd17

    • Size

      935KB

    • MD5

      819625d8241c6b19a959b5af0a6da828

    • SHA1

      29464830fa46a6f3241b671c8fb6f192ca9f65c6

    • SHA256

      e4dd005be515ad18e4462e1da6e44767fb50ff10d1565a2db93416780225dd17

    • SHA512

      cc6030f113b22e4fc406e3e9d0f9f687d8d22bc53416630a965e3112da537ae5aebd22261135dab6297082ff1fcfa6f4ce93cecf56c48d3daccb8fc1fed01449

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:pyHv5Z+Wzv7AiBll0OBWi6si9Gh

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks