General

  • Target

    e2ca8dc5ef936f246aa4cee9c092ab66fc5401d2b749a89bcd7b6f4008b1c5e1

  • Size

    935KB

  • Sample

    221125-hvl4kshg84

  • MD5

    bf5490d9b7595061adafe136a1894537

  • SHA1

    8830091c2017460495bbc42c4250422e2485d1fa

  • SHA256

    e2ca8dc5ef936f246aa4cee9c092ab66fc5401d2b749a89bcd7b6f4008b1c5e1

  • SHA512

    4b2da01ea37b2ecd36a609db7fadda07a993f69899b67fa48268ece48a3d38590b191cfb2c7e35606f82c8708881c01927554b1a19e3c8cf7b4cb92922db676f

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4s:JyHv5Z+Wzv7AiBll0OBWi6si9GB

Score
8/10
upx

Malware Config

Targets

    • Target

      e2ca8dc5ef936f246aa4cee9c092ab66fc5401d2b749a89bcd7b6f4008b1c5e1

    • Size

      935KB

    • MD5

      bf5490d9b7595061adafe136a1894537

    • SHA1

      8830091c2017460495bbc42c4250422e2485d1fa

    • SHA256

      e2ca8dc5ef936f246aa4cee9c092ab66fc5401d2b749a89bcd7b6f4008b1c5e1

    • SHA512

      4b2da01ea37b2ecd36a609db7fadda07a993f69899b67fa48268ece48a3d38590b191cfb2c7e35606f82c8708881c01927554b1a19e3c8cf7b4cb92922db676f

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4s:JyHv5Z+Wzv7AiBll0OBWi6si9GB

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks