General

  • Target

    c007a9be93cfadcd135f05a8a1569aea859188624a39ebca1b0c442abec16ec7

  • Size

    935KB

  • Sample

    221125-kgczvshd4s

  • MD5

    3ea0411b20e24f249b5a9d87a940fbd6

  • SHA1

    b708edd985ec3327082e1470f5aacea3a513dedb

  • SHA256

    c007a9be93cfadcd135f05a8a1569aea859188624a39ebca1b0c442abec16ec7

  • SHA512

    f1ba98dbc03ee2220fd9b55092838a1c9209f5c297a3abfe79d10fa3cbb0ed725b0450e6179dbdcea59de45eaf9d275f6a0a703fe1cff7a1741b2b41dde90127

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      c007a9be93cfadcd135f05a8a1569aea859188624a39ebca1b0c442abec16ec7

    • Size

      935KB

    • MD5

      3ea0411b20e24f249b5a9d87a940fbd6

    • SHA1

      b708edd985ec3327082e1470f5aacea3a513dedb

    • SHA256

      c007a9be93cfadcd135f05a8a1569aea859188624a39ebca1b0c442abec16ec7

    • SHA512

      f1ba98dbc03ee2220fd9b55092838a1c9209f5c297a3abfe79d10fa3cbb0ed725b0450e6179dbdcea59de45eaf9d275f6a0a703fe1cff7a1741b2b41dde90127

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks