General

  • Target

    666be378963a8fa9d946d1bc377b41bc722ad677cd75acee6758828005c217c4

  • Size

    931KB

  • Sample

    221125-plhs5abd8y

  • MD5

    9aa395732867d0078ac1a49fe30c2392

  • SHA1

    f42d0d1c369ca9a2139037ea09bc80024807631e

  • SHA256

    666be378963a8fa9d946d1bc377b41bc722ad677cd75acee6758828005c217c4

  • SHA512

    f688ce4343786667a292d662b63d8428277649a178ed59ada8e97cf19d3fbad9d836b7c5f19298353edd30df909f603f2015c402ac072d3d6fcd7cd7621c479b

  • SSDEEP

    24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

Score
8/10
upx

Malware Config

Targets

    • Target

      666be378963a8fa9d946d1bc377b41bc722ad677cd75acee6758828005c217c4

    • Size

      931KB

    • MD5

      9aa395732867d0078ac1a49fe30c2392

    • SHA1

      f42d0d1c369ca9a2139037ea09bc80024807631e

    • SHA256

      666be378963a8fa9d946d1bc377b41bc722ad677cd75acee6758828005c217c4

    • SHA512

      f688ce4343786667a292d662b63d8428277649a178ed59ada8e97cf19d3fbad9d836b7c5f19298353edd30df909f603f2015c402ac072d3d6fcd7cd7621c479b

    • SSDEEP

      24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks