General

  • Target

    799cce6a8f986ec2d28ab6e825ce77a37ecac0b7e7d884b401b9c200eb8cb0dd

  • Size

    935KB

  • Sample

    221125-np576adh38

  • MD5

    45b58fba846cecbb9cd32161b0d94931

  • SHA1

    cb8736a52dfc6b572e66a4bc5336cb0347e85697

  • SHA256

    799cce6a8f986ec2d28ab6e825ce77a37ecac0b7e7d884b401b9c200eb8cb0dd

  • SHA512

    e2f7828899fb6e85b2a3ce11d104ee826e7d23c0e12a561985cf4eabbf323e64e50e75ad4621a8177dcaba744981c9b1cc1f469e7969adf1ee2f0d302b5e5248

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:IyHv5Z+Wzv7AiBll0OBWi6si9Gi

Score
8/10
upx

Malware Config

Targets

    • Target

      799cce6a8f986ec2d28ab6e825ce77a37ecac0b7e7d884b401b9c200eb8cb0dd

    • Size

      935KB

    • MD5

      45b58fba846cecbb9cd32161b0d94931

    • SHA1

      cb8736a52dfc6b572e66a4bc5336cb0347e85697

    • SHA256

      799cce6a8f986ec2d28ab6e825ce77a37ecac0b7e7d884b401b9c200eb8cb0dd

    • SHA512

      e2f7828899fb6e85b2a3ce11d104ee826e7d23c0e12a561985cf4eabbf323e64e50e75ad4621a8177dcaba744981c9b1cc1f469e7969adf1ee2f0d302b5e5248

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4L:IyHv5Z+Wzv7AiBll0OBWi6si9Gi

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks