General

  • Target

    9a8e35359f7341f834a9c7b21b42128a5ddba12e2bbc04a0cacd4c20be8cdf54

  • Size

    935KB

  • Sample

    221125-l7km3adc5s

  • MD5

    096af11ca92024beddf62dfb81bc484b

  • SHA1

    b89ba88010d7b61ea30cee28a6c3251a1a5aa3f5

  • SHA256

    9a8e35359f7341f834a9c7b21b42128a5ddba12e2bbc04a0cacd4c20be8cdf54

  • SHA512

    8378aebd90a343680106707a54c475a8ac01e39dafbb996b74d1fcb51e056c59443126476020e038f44a48de0c9e81b0ba5f5550dc879b18c2eae5f8fdabc04c

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4M:IyHv5Z+Wzv7AiBll0OBWi6si9GZ

Score
8/10
upx

Malware Config

Targets

    • Target

      9a8e35359f7341f834a9c7b21b42128a5ddba12e2bbc04a0cacd4c20be8cdf54

    • Size

      935KB

    • MD5

      096af11ca92024beddf62dfb81bc484b

    • SHA1

      b89ba88010d7b61ea30cee28a6c3251a1a5aa3f5

    • SHA256

      9a8e35359f7341f834a9c7b21b42128a5ddba12e2bbc04a0cacd4c20be8cdf54

    • SHA512

      8378aebd90a343680106707a54c475a8ac01e39dafbb996b74d1fcb51e056c59443126476020e038f44a48de0c9e81b0ba5f5550dc879b18c2eae5f8fdabc04c

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4M:IyHv5Z+Wzv7AiBll0OBWi6si9GZ

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks