General

  • Target

    bf80885ba43c02b3cf7b940f3fcdbf4136be9c3b9ad993c60011c4f6b9adf8d6

  • Size

    935KB

  • Sample

    221125-kg5pwadh89

  • MD5

    2a80a060ffcaa9de8bd41bf1f6ad9ca8

  • SHA1

    362097105500a8fb0c86605e9ceb927a171836a4

  • SHA256

    bf80885ba43c02b3cf7b940f3fcdbf4136be9c3b9ad993c60011c4f6b9adf8d6

  • SHA512

    1238b08be9d6824123dbcd4569dafa45fd6b9ed2a9cfd44b1ce524761c2cdb53f3573cc0bf1e70a124ccd8eec2ba631284618ae95233188d138fd56919fe3097

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:JyHv5Z+Wzv7AiBll0OBWi6si9GO

Score
8/10
upx

Malware Config

Targets

    • Target

      bf80885ba43c02b3cf7b940f3fcdbf4136be9c3b9ad993c60011c4f6b9adf8d6

    • Size

      935KB

    • MD5

      2a80a060ffcaa9de8bd41bf1f6ad9ca8

    • SHA1

      362097105500a8fb0c86605e9ceb927a171836a4

    • SHA256

      bf80885ba43c02b3cf7b940f3fcdbf4136be9c3b9ad993c60011c4f6b9adf8d6

    • SHA512

      1238b08be9d6824123dbcd4569dafa45fd6b9ed2a9cfd44b1ce524761c2cdb53f3573cc0bf1e70a124ccd8eec2ba631284618ae95233188d138fd56919fe3097

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:JyHv5Z+Wzv7AiBll0OBWi6si9GO

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks