General

  • Target

    7359c28e7028720e92a74f28cbaf2d1fa73dcbfd16995606572e0f49bff9f457

  • Size

    935KB

  • Sample

    221125-n1ejkseg22

  • MD5

    d750317a01ea8651ad17b1a1ff3e0564

  • SHA1

    04addbb97f1f3a4849196a077b6fb74c5cc1d0ca

  • SHA256

    7359c28e7028720e92a74f28cbaf2d1fa73dcbfd16995606572e0f49bff9f457

  • SHA512

    94416db9864d92f002aaef18017f4262c5dfd1039748c3b65394d5f43b958ff6fb594221c8f342f46c44b8a171008874384ca51ce94e4320658c872ea12fa6b8

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4p:IyHv5Z+Wzv7AiBll0OBWi6si9G8

Score
8/10
upx

Malware Config

Targets

    • Target

      7359c28e7028720e92a74f28cbaf2d1fa73dcbfd16995606572e0f49bff9f457

    • Size

      935KB

    • MD5

      d750317a01ea8651ad17b1a1ff3e0564

    • SHA1

      04addbb97f1f3a4849196a077b6fb74c5cc1d0ca

    • SHA256

      7359c28e7028720e92a74f28cbaf2d1fa73dcbfd16995606572e0f49bff9f457

    • SHA512

      94416db9864d92f002aaef18017f4262c5dfd1039748c3b65394d5f43b958ff6fb594221c8f342f46c44b8a171008874384ca51ce94e4320658c872ea12fa6b8

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4p:IyHv5Z+Wzv7AiBll0OBWi6si9G8

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks