General

  • Target

    bea206d7ceb8a0a3d513a5d54c9db072a4ca619e5e217f57f9a6f3125ce7af23

  • Size

    935KB

  • Sample

    221125-kjb6caea66

  • MD5

    d59896c040dbef10b453d8f79234bb53

  • SHA1

    0c7dabc96a4b41844e83c8b4812af192f8e020b1

  • SHA256

    bea206d7ceb8a0a3d513a5d54c9db072a4ca619e5e217f57f9a6f3125ce7af23

  • SHA512

    48f86b7c588f4b36babd8349c2d275586216f1baad4828e6669025681a84b68e493b7b1c393cc40dabfc83e2270dd4af240bd3301dc7413e2629d1ea8d8016a1

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4B:pyHv5Z+Wzv7AiBll0OBWi6si9GM

Score
8/10
upx

Malware Config

Targets

    • Target

      bea206d7ceb8a0a3d513a5d54c9db072a4ca619e5e217f57f9a6f3125ce7af23

    • Size

      935KB

    • MD5

      d59896c040dbef10b453d8f79234bb53

    • SHA1

      0c7dabc96a4b41844e83c8b4812af192f8e020b1

    • SHA256

      bea206d7ceb8a0a3d513a5d54c9db072a4ca619e5e217f57f9a6f3125ce7af23

    • SHA512

      48f86b7c588f4b36babd8349c2d275586216f1baad4828e6669025681a84b68e493b7b1c393cc40dabfc83e2270dd4af240bd3301dc7413e2629d1ea8d8016a1

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4B:pyHv5Z+Wzv7AiBll0OBWi6si9GM

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks