General

  • Target

    624bc655f620f4b5ed9fa14011f02aaf3f161019ef3e29c9422ea465b05f5e98

  • Size

    935KB

  • Sample

    221125-przzlagg32

  • MD5

    53a02e5788ce5b98d82dce66734d4369

  • SHA1

    8aae6dfd937a6f421498362c226c12efb57cb3c4

  • SHA256

    624bc655f620f4b5ed9fa14011f02aaf3f161019ef3e29c9422ea465b05f5e98

  • SHA512

    e1945d765df6382d80659a0a15fdfb2d9a9ed4d1c7ceccc7e4982cb16f7d383b7f73a36280bf9b36af9b161e7d863ec4fdf5bcd5896bf66726bc96d2642e4137

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:5yHv5Z+Wzv7AiBll0OBWi6si9GV

Score
8/10
upx

Malware Config

Targets

    • Target

      624bc655f620f4b5ed9fa14011f02aaf3f161019ef3e29c9422ea465b05f5e98

    • Size

      935KB

    • MD5

      53a02e5788ce5b98d82dce66734d4369

    • SHA1

      8aae6dfd937a6f421498362c226c12efb57cb3c4

    • SHA256

      624bc655f620f4b5ed9fa14011f02aaf3f161019ef3e29c9422ea465b05f5e98

    • SHA512

      e1945d765df6382d80659a0a15fdfb2d9a9ed4d1c7ceccc7e4982cb16f7d383b7f73a36280bf9b36af9b161e7d863ec4fdf5bcd5896bf66726bc96d2642e4137

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:5yHv5Z+Wzv7AiBll0OBWi6si9GV

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks