General

  • Target

    bc9f2d3a9aa8bb635f25e7194ca740453e7465db2706773402e036fcdc1030f2

  • Size

    935KB

  • Sample

    221125-kmk8esec55

  • MD5

    3b5ba20d3123d1652dca1685b3caaf5a

  • SHA1

    f7677b13cf8686f2e20e5d741f9abc514a4914f5

  • SHA256

    bc9f2d3a9aa8bb635f25e7194ca740453e7465db2706773402e036fcdc1030f2

  • SHA512

    7bdae8461306584ee1ee4b724c3f9bab6007d6215fbd61e0ffc602e07676a8e8bca4c12bbb46f0d7c58864864e27dfc9510dd31b3a25afea139a5692e9b1a19a

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4N:IyHv5Z+Wzv7AiBll0OBWi6si9GQ

Score
8/10
upx

Malware Config

Targets

    • Target

      bc9f2d3a9aa8bb635f25e7194ca740453e7465db2706773402e036fcdc1030f2

    • Size

      935KB

    • MD5

      3b5ba20d3123d1652dca1685b3caaf5a

    • SHA1

      f7677b13cf8686f2e20e5d741f9abc514a4914f5

    • SHA256

      bc9f2d3a9aa8bb635f25e7194ca740453e7465db2706773402e036fcdc1030f2

    • SHA512

      7bdae8461306584ee1ee4b724c3f9bab6007d6215fbd61e0ffc602e07676a8e8bca4c12bbb46f0d7c58864864e27dfc9510dd31b3a25afea139a5692e9b1a19a

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4N:IyHv5Z+Wzv7AiBll0OBWi6si9GQ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks