General

  • Target

    778a547f5f14ef2b5f919a25e6c43b2f5aaa0f7ede0b0714c84b46564e68ac73

  • Size

    935KB

  • Sample

    221125-ns9dzshc9s

  • MD5

    37c9f0854688cff848bde99c26dd8649

  • SHA1

    8d0c550458cac40890caaceafd7dbcc4bc35dd52

  • SHA256

    778a547f5f14ef2b5f919a25e6c43b2f5aaa0f7ede0b0714c84b46564e68ac73

  • SHA512

    e3dc62fde71935098f4492e059132839ebd5b87eb509d152f535db929ea46a5432e3f31239ad528c7ab6c6b3d5d8c294e30197d28260997a22cee45c2349de35

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4I:IyHv5Z+Wzv7AiBll0OBWi6si9G5

Score
8/10
upx

Malware Config

Targets

    • Target

      778a547f5f14ef2b5f919a25e6c43b2f5aaa0f7ede0b0714c84b46564e68ac73

    • Size

      935KB

    • MD5

      37c9f0854688cff848bde99c26dd8649

    • SHA1

      8d0c550458cac40890caaceafd7dbcc4bc35dd52

    • SHA256

      778a547f5f14ef2b5f919a25e6c43b2f5aaa0f7ede0b0714c84b46564e68ac73

    • SHA512

      e3dc62fde71935098f4492e059132839ebd5b87eb509d152f535db929ea46a5432e3f31239ad528c7ab6c6b3d5d8c294e30197d28260997a22cee45c2349de35

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4I:IyHv5Z+Wzv7AiBll0OBWi6si9G5

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks