General

  • Target

    c305dab93ac81ee6557b4f91dbdf89cd95b160e33b2a11a0c4f5921a1b2209df

  • Size

    935KB

  • Sample

    221125-kcc43adf47

  • MD5

    2a680a1affc43f77aec39d63967db9e4

  • SHA1

    e18b9a65a43626c47e6cb5316bc51de3156607fa

  • SHA256

    c305dab93ac81ee6557b4f91dbdf89cd95b160e33b2a11a0c4f5921a1b2209df

  • SHA512

    52a10401b06717b6f7b6a487b7494bdc288f5c521eff6da899680a3eb6fa69edc976b7ebadc0e75037b648f73ea2ed7671e589186e92c3cc8737041ac48da1d7

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:pyHv5Z+Wzv7AiBll0OBWi6si9GC

Score
8/10
upx

Malware Config

Targets

    • Target

      c305dab93ac81ee6557b4f91dbdf89cd95b160e33b2a11a0c4f5921a1b2209df

    • Size

      935KB

    • MD5

      2a680a1affc43f77aec39d63967db9e4

    • SHA1

      e18b9a65a43626c47e6cb5316bc51de3156607fa

    • SHA256

      c305dab93ac81ee6557b4f91dbdf89cd95b160e33b2a11a0c4f5921a1b2209df

    • SHA512

      52a10401b06717b6f7b6a487b7494bdc288f5c521eff6da899680a3eb6fa69edc976b7ebadc0e75037b648f73ea2ed7671e589186e92c3cc8737041ac48da1d7

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:pyHv5Z+Wzv7AiBll0OBWi6si9GC

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks