General

  • Target

    a573df9ed846b8c5c218075dc3e85104393c4cd9106ea4e3edd79f271ebdd33c

  • Size

    935KB

  • Sample

    221125-ln3pjacb3v

  • MD5

    20dae2e17c1304ff64b77149866c269a

  • SHA1

    bb1cb9e1b3d500c3dcc9ad56d5f0f9ec148793a4

  • SHA256

    a573df9ed846b8c5c218075dc3e85104393c4cd9106ea4e3edd79f271ebdd33c

  • SHA512

    b8d867c2902fe5929fef77ea46151316103a774fc37548d2b6323c779522b7f13ed22ce3920e2ad0059f822f2d6eeeaa710bd41e4ddafad426c83ae5101207db

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4x:pyHv5Z+Wzv7AiBll0OBWi6si9GA

Score
8/10
upx

Malware Config

Targets

    • Target

      a573df9ed846b8c5c218075dc3e85104393c4cd9106ea4e3edd79f271ebdd33c

    • Size

      935KB

    • MD5

      20dae2e17c1304ff64b77149866c269a

    • SHA1

      bb1cb9e1b3d500c3dcc9ad56d5f0f9ec148793a4

    • SHA256

      a573df9ed846b8c5c218075dc3e85104393c4cd9106ea4e3edd79f271ebdd33c

    • SHA512

      b8d867c2902fe5929fef77ea46151316103a774fc37548d2b6323c779522b7f13ed22ce3920e2ad0059f822f2d6eeeaa710bd41e4ddafad426c83ae5101207db

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4x:pyHv5Z+Wzv7AiBll0OBWi6si9GA

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks