General

  • Target

    654452617010c0738d4621c387937c3b72d81052518bc7f0300b120810c53ec6

  • Size

    935KB

  • Sample

    221125-pnakjabe9x

  • MD5

    2ee291cc52766d3e0f01590c4f2b1b74

  • SHA1

    8240d499fa590aee803bb3ff81b78008542a738b

  • SHA256

    654452617010c0738d4621c387937c3b72d81052518bc7f0300b120810c53ec6

  • SHA512

    f00d72681cf0e77d3a2157f904b3dcaf6478291f3503020eed448b6bcd7328e88a22e8bbf4a55b4f991a506b9cd2cc75c1ed05588c600b931e7e48479d1ab859

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4z:oyHv5Z+Wzv7AiBll0OBWi6si9G+

Score
8/10
upx

Malware Config

Targets

    • Target

      654452617010c0738d4621c387937c3b72d81052518bc7f0300b120810c53ec6

    • Size

      935KB

    • MD5

      2ee291cc52766d3e0f01590c4f2b1b74

    • SHA1

      8240d499fa590aee803bb3ff81b78008542a738b

    • SHA256

      654452617010c0738d4621c387937c3b72d81052518bc7f0300b120810c53ec6

    • SHA512

      f00d72681cf0e77d3a2157f904b3dcaf6478291f3503020eed448b6bcd7328e88a22e8bbf4a55b4f991a506b9cd2cc75c1ed05588c600b931e7e48479d1ab859

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4z:oyHv5Z+Wzv7AiBll0OBWi6si9G+

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks