General

  • Target

    7ffd2a5c355d585577b888b318d60071bde723c164074b485b9e86f1ec0444d0

  • Size

    935KB

  • Sample

    221125-ne7m8sgd6t

  • MD5

    7f88ca9dd92083b07ea3a7cb087ca8c8

  • SHA1

    12607cf416b194913c404ee1d311a04064f81274

  • SHA256

    7ffd2a5c355d585577b888b318d60071bde723c164074b485b9e86f1ec0444d0

  • SHA512

    0c6a86e0f9eda69c74bc5efe9d0e442f91843921e8c584b3d309af1de63087ffb6a33b574915feac91ee5506f5f6ceb46f8123865a462473db005fbf95518e6d

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:pyHv5Z+Wzv7AiBll0OBWi6si9Gu

Score
8/10
upx

Malware Config

Targets

    • Target

      7ffd2a5c355d585577b888b318d60071bde723c164074b485b9e86f1ec0444d0

    • Size

      935KB

    • MD5

      7f88ca9dd92083b07ea3a7cb087ca8c8

    • SHA1

      12607cf416b194913c404ee1d311a04064f81274

    • SHA256

      7ffd2a5c355d585577b888b318d60071bde723c164074b485b9e86f1ec0444d0

    • SHA512

      0c6a86e0f9eda69c74bc5efe9d0e442f91843921e8c584b3d309af1de63087ffb6a33b574915feac91ee5506f5f6ceb46f8123865a462473db005fbf95518e6d

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:pyHv5Z+Wzv7AiBll0OBWi6si9Gu

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks