General

  • Target

    a7069e55c55f778cc11b526ed2c865e074f356a698c8b9d8e7e8e0d4c99c0647

  • Size

    935KB

  • Sample

    221125-ll2dpagd73

  • MD5

    3829717d1ed3f0f8b3c516105f69e7b7

  • SHA1

    d205efa5b16599383fcb9895f32f229e01b8c9b9

  • SHA256

    a7069e55c55f778cc11b526ed2c865e074f356a698c8b9d8e7e8e0d4c99c0647

  • SHA512

    f9071e8d4f272149e11858b1b97e8049126d7c3e81b22374ba1833e6439668d00122aa5643cc86fd22396f53426fe91dd2f255ee182e60a7f7adbb62bdd56364

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4T:pyHv5Z+Wzv7AiBll0OBWi6si9G2

Score
8/10
upx

Malware Config

Targets

    • Target

      a7069e55c55f778cc11b526ed2c865e074f356a698c8b9d8e7e8e0d4c99c0647

    • Size

      935KB

    • MD5

      3829717d1ed3f0f8b3c516105f69e7b7

    • SHA1

      d205efa5b16599383fcb9895f32f229e01b8c9b9

    • SHA256

      a7069e55c55f778cc11b526ed2c865e074f356a698c8b9d8e7e8e0d4c99c0647

    • SHA512

      f9071e8d4f272149e11858b1b97e8049126d7c3e81b22374ba1833e6439668d00122aa5643cc86fd22396f53426fe91dd2f255ee182e60a7f7adbb62bdd56364

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4T:pyHv5Z+Wzv7AiBll0OBWi6si9G2

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks