General

  • Target

    bb114cf79220cf8b50fe8ae59b5b23595cc906b4be0b0d143ded920b207fc22f

  • Size

    935KB

  • Sample

    221125-kpp96ahh4t

  • MD5

    b959091fe14217d3db4f0c5fabc7fc2b

  • SHA1

    de057a49b0fe096b998d5431a4e571590620c955

  • SHA256

    bb114cf79220cf8b50fe8ae59b5b23595cc906b4be0b0d143ded920b207fc22f

  • SHA512

    94696c402f3b8a945714c4a90f84e2edb46aa0c349e6bebd0acaa1025aa395706f9b5995a26bcdf0a224b5644c997fc4b29bba12d9497719a3b5d5f20c4e41cf

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4G:oyHv5Z+Wzv7AiBll0OBWi6si9Gz

Score
8/10
upx

Malware Config

Targets

    • Target

      bb114cf79220cf8b50fe8ae59b5b23595cc906b4be0b0d143ded920b207fc22f

    • Size

      935KB

    • MD5

      b959091fe14217d3db4f0c5fabc7fc2b

    • SHA1

      de057a49b0fe096b998d5431a4e571590620c955

    • SHA256

      bb114cf79220cf8b50fe8ae59b5b23595cc906b4be0b0d143ded920b207fc22f

    • SHA512

      94696c402f3b8a945714c4a90f84e2edb46aa0c349e6bebd0acaa1025aa395706f9b5995a26bcdf0a224b5644c997fc4b29bba12d9497719a3b5d5f20c4e41cf

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4G:oyHv5Z+Wzv7AiBll0OBWi6si9Gz

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks