General

  • Target

    9ac6f3b1f7614f74ad716ffaf018092427bf87ae9e3a8b020090ce83793feacb

  • Size

    935KB

  • Sample

    221125-l67q7sdc3s

  • MD5

    6fda0bee82b79a570e052b6dacc8d4d6

  • SHA1

    a1ba2c4fd06725a82129bfdd03f730676916e5e0

  • SHA256

    9ac6f3b1f7614f74ad716ffaf018092427bf87ae9e3a8b020090ce83793feacb

  • SHA512

    45b3287ee8e2d98e5157b1a0d10cc05ad74eefe4fa30d1883871fdc223ba8b1a5bf591463c2f98f8eaa10cf83646f415a17ccfc6814e12cd4359bf03917943a7

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x49:oyHv5Z+Wzv7AiBll0OBWi6si9G4

Score
8/10
upx

Malware Config

Targets

    • Target

      9ac6f3b1f7614f74ad716ffaf018092427bf87ae9e3a8b020090ce83793feacb

    • Size

      935KB

    • MD5

      6fda0bee82b79a570e052b6dacc8d4d6

    • SHA1

      a1ba2c4fd06725a82129bfdd03f730676916e5e0

    • SHA256

      9ac6f3b1f7614f74ad716ffaf018092427bf87ae9e3a8b020090ce83793feacb

    • SHA512

      45b3287ee8e2d98e5157b1a0d10cc05ad74eefe4fa30d1883871fdc223ba8b1a5bf591463c2f98f8eaa10cf83646f415a17ccfc6814e12cd4359bf03917943a7

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x49:oyHv5Z+Wzv7AiBll0OBWi6si9G4

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks