General

  • Target

    e4bd9cf3c0f05ac8eecb470e163ad9e24ca5e438831d67a2ca0cab1953a70843

  • Size

    935KB

  • Sample

    221125-hrz62ahf25

  • MD5

    75a17a6975831a473642b220e9ac45d5

  • SHA1

    1ef6f7e2ef50e542cf763a6af94beb82023d179e

  • SHA256

    e4bd9cf3c0f05ac8eecb470e163ad9e24ca5e438831d67a2ca0cab1953a70843

  • SHA512

    446f7bfda5cedd2a3ee3ef0aba64af4215c38fb695b33a43449551ba9a57679d21582c472db64cf1097a7ce266b0713e636d17403d125b109c8b0b36587274d6

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4r:pyHv5Z+Wzv7AiBll0OBWi6si9Ga

Score
8/10
upx

Malware Config

Targets

    • Target

      e4bd9cf3c0f05ac8eecb470e163ad9e24ca5e438831d67a2ca0cab1953a70843

    • Size

      935KB

    • MD5

      75a17a6975831a473642b220e9ac45d5

    • SHA1

      1ef6f7e2ef50e542cf763a6af94beb82023d179e

    • SHA256

      e4bd9cf3c0f05ac8eecb470e163ad9e24ca5e438831d67a2ca0cab1953a70843

    • SHA512

      446f7bfda5cedd2a3ee3ef0aba64af4215c38fb695b33a43449551ba9a57679d21582c472db64cf1097a7ce266b0713e636d17403d125b109c8b0b36587274d6

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4r:pyHv5Z+Wzv7AiBll0OBWi6si9Ga

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks