General

  • Target

    6f6f1dc90d9759eb1b4eab750b8a81032e104d01b10b10c3a69604aa78d80e6e

  • Size

    935KB

  • Sample

    221125-n666safb93

  • MD5

    0b42205e856834eda47e1ff0d1665784

  • SHA1

    144774964d003bd5bb891139052fdffcde229811

  • SHA256

    6f6f1dc90d9759eb1b4eab750b8a81032e104d01b10b10c3a69604aa78d80e6e

  • SHA512

    aa0b6c14f3d530c1dab4c8a97dbd86c5fab0ad4ca3300f6f67581cb6795a74645bc57e2b3e1f5a21303d2561f592a69cc4ce6ba30ec4409df7fe1dcfdb359de2

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      6f6f1dc90d9759eb1b4eab750b8a81032e104d01b10b10c3a69604aa78d80e6e

    • Size

      935KB

    • MD5

      0b42205e856834eda47e1ff0d1665784

    • SHA1

      144774964d003bd5bb891139052fdffcde229811

    • SHA256

      6f6f1dc90d9759eb1b4eab750b8a81032e104d01b10b10c3a69604aa78d80e6e

    • SHA512

      aa0b6c14f3d530c1dab4c8a97dbd86c5fab0ad4ca3300f6f67581cb6795a74645bc57e2b3e1f5a21303d2561f592a69cc4ce6ba30ec4409df7fe1dcfdb359de2

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks