General

  • Target

    e2f8ea8a1c17e70461a7c50204e5f18424b3a3ed7d2847542398f1012fb493cf

  • Size

    935KB

  • Sample

    221125-hvgh4ahg77

  • MD5

    ccbf2ee1219c8818f7256a355202b443

  • SHA1

    3e4aa5864c1d96d70cd55829d014e325311edb91

  • SHA256

    e2f8ea8a1c17e70461a7c50204e5f18424b3a3ed7d2847542398f1012fb493cf

  • SHA512

    e21ef1e0abe3e84f7b86ff694c0c442c4f8d8d5c9a4a8687bfda56a44e8aacb2c685e83b344cb22bb5ae26794b2281cc0668945964e30b14f70bfda16c81e78d

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4R:oyHv5Z+Wzv7AiBll0OBWi6si9Gc

Score
8/10
upx

Malware Config

Targets

    • Target

      e2f8ea8a1c17e70461a7c50204e5f18424b3a3ed7d2847542398f1012fb493cf

    • Size

      935KB

    • MD5

      ccbf2ee1219c8818f7256a355202b443

    • SHA1

      3e4aa5864c1d96d70cd55829d014e325311edb91

    • SHA256

      e2f8ea8a1c17e70461a7c50204e5f18424b3a3ed7d2847542398f1012fb493cf

    • SHA512

      e21ef1e0abe3e84f7b86ff694c0c442c4f8d8d5c9a4a8687bfda56a44e8aacb2c685e83b344cb22bb5ae26794b2281cc0668945964e30b14f70bfda16c81e78d

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4R:oyHv5Z+Wzv7AiBll0OBWi6si9Gc

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks