General

  • Target

    6153546bac647beb7e0b3723ba0f1a92f9c98afba4a8a76cfa2aa895bb68f029

  • Size

    931KB

  • Sample

    221125-ps4zyagg84

  • MD5

    4d885fddf930e91565ec9274ed68a060

  • SHA1

    84610170a2fb6290bcfc478be9b0efc23448148d

  • SHA256

    6153546bac647beb7e0b3723ba0f1a92f9c98afba4a8a76cfa2aa895bb68f029

  • SHA512

    ae4146e462d2aee26771d1931c24e03c79137d305990f1bbd326693cecd731151c2bb39632f408d90e2270190d6a214074186776d4b3d15afcddf8db1001c865

  • SSDEEP

    24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

Score
8/10
upx

Malware Config

Targets

    • Target

      6153546bac647beb7e0b3723ba0f1a92f9c98afba4a8a76cfa2aa895bb68f029

    • Size

      931KB

    • MD5

      4d885fddf930e91565ec9274ed68a060

    • SHA1

      84610170a2fb6290bcfc478be9b0efc23448148d

    • SHA256

      6153546bac647beb7e0b3723ba0f1a92f9c98afba4a8a76cfa2aa895bb68f029

    • SHA512

      ae4146e462d2aee26771d1931c24e03c79137d305990f1bbd326693cecd731151c2bb39632f408d90e2270190d6a214074186776d4b3d15afcddf8db1001c865

    • SSDEEP

      24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks