General

  • Target

    63e8c4f67f5cb92c497335d739e76782bdd49107aacd86824c350d220755144f

  • Size

    935KB

  • Sample

    221125-pps39sge68

  • MD5

    3d903c535110c5bfc631ed078cabdec0

  • SHA1

    9e08bbc5802b59f1472e77e70e22f69d9b051878

  • SHA256

    63e8c4f67f5cb92c497335d739e76782bdd49107aacd86824c350d220755144f

  • SHA512

    0ffdb845d63ca6211a88d34760554f5254bf282930ba3bfc612063630bd76e70a1a4a839a37b50dc417df5eb30c9804dfb75c7117e80bbc98a22391eff27753d

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4F:pyHv5Z+Wzv7AiBll0OBWi6si9G0

Score
8/10
upx

Malware Config

Targets

    • Target

      63e8c4f67f5cb92c497335d739e76782bdd49107aacd86824c350d220755144f

    • Size

      935KB

    • MD5

      3d903c535110c5bfc631ed078cabdec0

    • SHA1

      9e08bbc5802b59f1472e77e70e22f69d9b051878

    • SHA256

      63e8c4f67f5cb92c497335d739e76782bdd49107aacd86824c350d220755144f

    • SHA512

      0ffdb845d63ca6211a88d34760554f5254bf282930ba3bfc612063630bd76e70a1a4a839a37b50dc417df5eb30c9804dfb75c7117e80bbc98a22391eff27753d

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4F:pyHv5Z+Wzv7AiBll0OBWi6si9G0

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks