General

  • Target

    632d5bf996656557130faf9fcb4ffed15a12104f9dd6eb71819fffc8616c1c51

  • Size

    931KB

  • Sample

    221125-pqqpjagf37

  • MD5

    aef4af30520c4ba082939889dec87410

  • SHA1

    fd147a620abf3f59798d327466e22e60312a11b8

  • SHA256

    632d5bf996656557130faf9fcb4ffed15a12104f9dd6eb71819fffc8616c1c51

  • SHA512

    62e8a23c7fd81e478969243395cd9935799a96f2bdf9994641d0176e97486f627fc66074bcacb31e1e5b3dae6845656318707b0768504c91d03a0e9fb1374491

  • SSDEEP

    24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKK:C6j19rut7FoU56w

Score
8/10
upx

Malware Config

Targets

    • Target

      632d5bf996656557130faf9fcb4ffed15a12104f9dd6eb71819fffc8616c1c51

    • Size

      931KB

    • MD5

      aef4af30520c4ba082939889dec87410

    • SHA1

      fd147a620abf3f59798d327466e22e60312a11b8

    • SHA256

      632d5bf996656557130faf9fcb4ffed15a12104f9dd6eb71819fffc8616c1c51

    • SHA512

      62e8a23c7fd81e478969243395cd9935799a96f2bdf9994641d0176e97486f627fc66074bcacb31e1e5b3dae6845656318707b0768504c91d03a0e9fb1374491

    • SSDEEP

      24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKK:C6j19rut7FoU56w

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks