General

  • Target

    63ab3afe595b49380e3cf6cecbc1e4758cf5e586a7787cb90551ef86229344da

  • Size

    931KB

  • Sample

    221125-pp53tsbg4x

  • MD5

    ce8b3d46a3b124a739873fc3f5925122

  • SHA1

    771191993bed739180905a0e7067f872523aa02d

  • SHA256

    63ab3afe595b49380e3cf6cecbc1e4758cf5e586a7787cb90551ef86229344da

  • SHA512

    3134601ccf194966487c8beaa68e218bcc48bd674d3e2ced3655dc3994a02b0aac2c83e022a8f778b68887f009be660d8471c86ab5053d9f681dbb0df178b091

  • SSDEEP

    24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56

Score
8/10
upx

Malware Config

Targets

    • Target

      63ab3afe595b49380e3cf6cecbc1e4758cf5e586a7787cb90551ef86229344da

    • Size

      931KB

    • MD5

      ce8b3d46a3b124a739873fc3f5925122

    • SHA1

      771191993bed739180905a0e7067f872523aa02d

    • SHA256

      63ab3afe595b49380e3cf6cecbc1e4758cf5e586a7787cb90551ef86229344da

    • SHA512

      3134601ccf194966487c8beaa68e218bcc48bd674d3e2ced3655dc3994a02b0aac2c83e022a8f778b68887f009be660d8471c86ab5053d9f681dbb0df178b091

    • SSDEEP

      24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks