General

  • Target

    7d7d786df60b6649c306fcba341b0b2d073e618b3addf5c4b2209ff6d6926d08

  • Size

    935KB

  • Sample

    221125-njvjgagf61

  • MD5

    3c26e7a5b4d08b536e25d3906738ab25

  • SHA1

    00426d8b503981ba5e4d29450a57b2d13ea87b54

  • SHA256

    7d7d786df60b6649c306fcba341b0b2d073e618b3addf5c4b2209ff6d6926d08

  • SHA512

    ffc632c85be94ea8172afadc5317d3d6ce5309ad47045b4747fc4fc28a2cb83d3ebcb40850cb77737e69f032d659583bd671059af3debac7dd36d194a001e00d

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      7d7d786df60b6649c306fcba341b0b2d073e618b3addf5c4b2209ff6d6926d08

    • Size

      935KB

    • MD5

      3c26e7a5b4d08b536e25d3906738ab25

    • SHA1

      00426d8b503981ba5e4d29450a57b2d13ea87b54

    • SHA256

      7d7d786df60b6649c306fcba341b0b2d073e618b3addf5c4b2209ff6d6926d08

    • SHA512

      ffc632c85be94ea8172afadc5317d3d6ce5309ad47045b4747fc4fc28a2cb83d3ebcb40850cb77737e69f032d659583bd671059af3debac7dd36d194a001e00d

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks