General

  • Target

    c157a544f7886a8fdf31c09e78660f365d8bff906d77fefe4272159030f52b03

  • Size

    935KB

  • Sample

    221125-kej1dshc4v

  • MD5

    dbb4f0b8af45cee249c26213af351fc6

  • SHA1

    f39cc8a9db6119a5d98a4cce2e9abc0cdbb2d31b

  • SHA256

    c157a544f7886a8fdf31c09e78660f365d8bff906d77fefe4272159030f52b03

  • SHA512

    d02572d7ab4415f01e6f303ce6b8d6c7e0466cfc3e4a91f24d71df975a63dfb60142246761df93fa53aac13fad0b28e5dfd2ab150ae60e317a9cab87389751b6

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4e:oyHv5Z+Wzv7AiBll0OBWi6si9G/

Score
8/10
upx

Malware Config

Targets

    • Target

      c157a544f7886a8fdf31c09e78660f365d8bff906d77fefe4272159030f52b03

    • Size

      935KB

    • MD5

      dbb4f0b8af45cee249c26213af351fc6

    • SHA1

      f39cc8a9db6119a5d98a4cce2e9abc0cdbb2d31b

    • SHA256

      c157a544f7886a8fdf31c09e78660f365d8bff906d77fefe4272159030f52b03

    • SHA512

      d02572d7ab4415f01e6f303ce6b8d6c7e0466cfc3e4a91f24d71df975a63dfb60142246761df93fa53aac13fad0b28e5dfd2ab150ae60e317a9cab87389751b6

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4e:oyHv5Z+Wzv7AiBll0OBWi6si9G/

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks