General

  • Target

    7137380228c3232c860db71e78935d023bfd97d6237360b1e8b09d41be46e4a5

  • Size

    935KB

  • Sample

    221125-n4c5xsfa36

  • MD5

    2eaf8963bedabbba26be9a89ea2a91f4

  • SHA1

    2e9d6fa4cd0a299b259a4b9fcc5bb59584231a26

  • SHA256

    7137380228c3232c860db71e78935d023bfd97d6237360b1e8b09d41be46e4a5

  • SHA512

    d39fb4159e22f8b2bd50889cb7815ef7cede4a8d0a46e6bdf14d8b43aab82d24d0566dc794528b766c2a790e8ab5abcd5e560675ff6263940acc5f4e541e761c

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x44:oyHv5Z+Wzv7AiBll0OBWi6si9GV

Score
8/10
upx

Malware Config

Targets

    • Target

      7137380228c3232c860db71e78935d023bfd97d6237360b1e8b09d41be46e4a5

    • Size

      935KB

    • MD5

      2eaf8963bedabbba26be9a89ea2a91f4

    • SHA1

      2e9d6fa4cd0a299b259a4b9fcc5bb59584231a26

    • SHA256

      7137380228c3232c860db71e78935d023bfd97d6237360b1e8b09d41be46e4a5

    • SHA512

      d39fb4159e22f8b2bd50889cb7815ef7cede4a8d0a46e6bdf14d8b43aab82d24d0566dc794528b766c2a790e8ab5abcd5e560675ff6263940acc5f4e541e761c

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x44:oyHv5Z+Wzv7AiBll0OBWi6si9GV

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks