General

  • Target

    9afa8fbe222731ed71aea4c200c5774864af1335ccab030c291c505de4ca0e19

  • Size

    935KB

  • Sample

    221125-l6xw1ahf89

  • MD5

    7dd1a676da3f0f3a6eab4c8f31016d67

  • SHA1

    df060a5f88f49b63eeb423aa99725d8dcab0624d

  • SHA256

    9afa8fbe222731ed71aea4c200c5774864af1335ccab030c291c505de4ca0e19

  • SHA512

    d2a075dec8c52c48ccfac6090bd39a6dd608d03fff1fbc1d8df5ffd1b1fe74cc55e80251c990c07616745867e1c8c2f9ee1c414c52ad225a2db68690ed40d1a8

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4a:pyHv5Z+Wzv7AiBll0OBWi6si9G7

Score
8/10
upx

Malware Config

Targets

    • Target

      9afa8fbe222731ed71aea4c200c5774864af1335ccab030c291c505de4ca0e19

    • Size

      935KB

    • MD5

      7dd1a676da3f0f3a6eab4c8f31016d67

    • SHA1

      df060a5f88f49b63eeb423aa99725d8dcab0624d

    • SHA256

      9afa8fbe222731ed71aea4c200c5774864af1335ccab030c291c505de4ca0e19

    • SHA512

      d2a075dec8c52c48ccfac6090bd39a6dd608d03fff1fbc1d8df5ffd1b1fe74cc55e80251c990c07616745867e1c8c2f9ee1c414c52ad225a2db68690ed40d1a8

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4a:pyHv5Z+Wzv7AiBll0OBWi6si9G7

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks