General

  • Target

    a1c2794605c1e445800a4c14896f40bc7b53262faf42cdee953cb9bd6b9d0b3d

  • Size

    935KB

  • Sample

    221125-lvw6bsce5s

  • MD5

    c3c9c493dc15127ecf9a2e49d753f59e

  • SHA1

    63524331a9c84263335a957bedf04daefd4ebd73

  • SHA256

    a1c2794605c1e445800a4c14896f40bc7b53262faf42cdee953cb9bd6b9d0b3d

  • SHA512

    406438f3b674d043c13b40de32b4859f001b98d53e78d6c9ea866122d3c0fb6fa84b1ddcb703ca9f6b1aaf28ae0acb83d46a177a8ee215cb0fe059fa2be43b26

  • SSDEEP

    12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      a1c2794605c1e445800a4c14896f40bc7b53262faf42cdee953cb9bd6b9d0b3d

    • Size

      935KB

    • MD5

      c3c9c493dc15127ecf9a2e49d753f59e

    • SHA1

      63524331a9c84263335a957bedf04daefd4ebd73

    • SHA256

      a1c2794605c1e445800a4c14896f40bc7b53262faf42cdee953cb9bd6b9d0b3d

    • SHA512

      406438f3b674d043c13b40de32b4859f001b98d53e78d6c9ea866122d3c0fb6fa84b1ddcb703ca9f6b1aaf28ae0acb83d46a177a8ee215cb0fe059fa2be43b26

    • SSDEEP

      12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks