General

  • Target

    640627e77f97c4ddf2dcf54d38ae4ee5443ceb69158213f755bd040dcb3cbfd3

  • Size

    935KB

  • Sample

    221125-ppntjsbf9v

  • MD5

    22f97c482603f9e96e0c98c229534224

  • SHA1

    db1ad0efd3145e6812ce1c8ca72df54a739666b6

  • SHA256

    640627e77f97c4ddf2dcf54d38ae4ee5443ceb69158213f755bd040dcb3cbfd3

  • SHA512

    7e96b5e78046b5cc0dbb48081728af1e5b55f0dc3047c6340cf3915e46277f5b54cae8b99d3cd3e88e50a5f4e3ce863828aa0d2f20eadb5efe155d031d1f22fa

  • SSDEEP

    12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:ZyHv5Z+Wzv7AiBll0OBWi6si9Ge

Score
8/10
upx

Malware Config

Targets

    • Target

      640627e77f97c4ddf2dcf54d38ae4ee5443ceb69158213f755bd040dcb3cbfd3

    • Size

      935KB

    • MD5

      22f97c482603f9e96e0c98c229534224

    • SHA1

      db1ad0efd3145e6812ce1c8ca72df54a739666b6

    • SHA256

      640627e77f97c4ddf2dcf54d38ae4ee5443ceb69158213f755bd040dcb3cbfd3

    • SHA512

      7e96b5e78046b5cc0dbb48081728af1e5b55f0dc3047c6340cf3915e46277f5b54cae8b99d3cd3e88e50a5f4e3ce863828aa0d2f20eadb5efe155d031d1f22fa

    • SSDEEP

      12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4f:ZyHv5Z+Wzv7AiBll0OBWi6si9Ge

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks