General

  • Target

    b120696d24b6f31ce11b45dc6ae81ac5c5ee1b83d1e086daf7388bab3dfb19c5

  • Size

    935KB

  • Sample

    221125-k5827sah4s

  • MD5

    36638eb3f0c1b651283a57000d01cbff

  • SHA1

    fca9640efe14bc2939614674bf9187205f7571dd

  • SHA256

    b120696d24b6f31ce11b45dc6ae81ac5c5ee1b83d1e086daf7388bab3dfb19c5

  • SHA512

    c6947377192ba2bf8015c53e87488a327e9fb2c5aa36a8f0a205cba768d45e88e1a3358510bc8492a4dd3788e3e29a5a174132d2cb3da887385e40f607df33dc

  • SSDEEP

    12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      b120696d24b6f31ce11b45dc6ae81ac5c5ee1b83d1e086daf7388bab3dfb19c5

    • Size

      935KB

    • MD5

      36638eb3f0c1b651283a57000d01cbff

    • SHA1

      fca9640efe14bc2939614674bf9187205f7571dd

    • SHA256

      b120696d24b6f31ce11b45dc6ae81ac5c5ee1b83d1e086daf7388bab3dfb19c5

    • SHA512

      c6947377192ba2bf8015c53e87488a327e9fb2c5aa36a8f0a205cba768d45e88e1a3358510bc8492a4dd3788e3e29a5a174132d2cb3da887385e40f607df33dc

    • SSDEEP

      12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks