General

  • Target

    74e74b393c3c77557c81bd654cb92e73cccf77db33a49b272856461b5a4ff9bd

  • Size

    935KB

  • Sample

    221125-nx6hwsee67

  • MD5

    bf085923b5c77ab1c394f7f36fc1d592

  • SHA1

    7ef27ee8e245a76202799a96f6f712869dd6f067

  • SHA256

    74e74b393c3c77557c81bd654cb92e73cccf77db33a49b272856461b5a4ff9bd

  • SHA512

    54e9475c48cac87d6fe01e99c94d11a70f221aab6d128f2f5e9dd2b737e31c0f1c2690e691274596f5f9ff7229e354221b7641dc490b1e55aaa8075b6f21e2de

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:JyHv5Z+Wzv7AiBll0OBWi6si9GO

Score
8/10
upx

Malware Config

Targets

    • Target

      74e74b393c3c77557c81bd654cb92e73cccf77db33a49b272856461b5a4ff9bd

    • Size

      935KB

    • MD5

      bf085923b5c77ab1c394f7f36fc1d592

    • SHA1

      7ef27ee8e245a76202799a96f6f712869dd6f067

    • SHA256

      74e74b393c3c77557c81bd654cb92e73cccf77db33a49b272856461b5a4ff9bd

    • SHA512

      54e9475c48cac87d6fe01e99c94d11a70f221aab6d128f2f5e9dd2b737e31c0f1c2690e691274596f5f9ff7229e354221b7641dc490b1e55aaa8075b6f21e2de

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:JyHv5Z+Wzv7AiBll0OBWi6si9GO

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks