General

  • Target

    61f6affcee3ebb9ffb4af27c72fbe36b15b07156d65728aaa9f3f0dceee49189

  • Size

    935KB

  • Sample

    221125-psfmcabh71

  • MD5

    7fbe1a1a11ae5c14a9c35796b6f88c91

  • SHA1

    09a165f79bf2d189ddc314917f3c56c8f7d6d535

  • SHA256

    61f6affcee3ebb9ffb4af27c72fbe36b15b07156d65728aaa9f3f0dceee49189

  • SHA512

    b27247e0e1116d49900890f5793609ba1ce983d6a5fd68bc445c5c719fb697d19be44f702d2a34906599df01a3c0a1c63269e2e071710d50e7b24c370d057b73

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4h:oyHv5Z+Wzv7AiBll0OBWi6si9Gs

Score
8/10
upx

Malware Config

Targets

    • Target

      61f6affcee3ebb9ffb4af27c72fbe36b15b07156d65728aaa9f3f0dceee49189

    • Size

      935KB

    • MD5

      7fbe1a1a11ae5c14a9c35796b6f88c91

    • SHA1

      09a165f79bf2d189ddc314917f3c56c8f7d6d535

    • SHA256

      61f6affcee3ebb9ffb4af27c72fbe36b15b07156d65728aaa9f3f0dceee49189

    • SHA512

      b27247e0e1116d49900890f5793609ba1ce983d6a5fd68bc445c5c719fb697d19be44f702d2a34906599df01a3c0a1c63269e2e071710d50e7b24c370d057b73

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4h:oyHv5Z+Wzv7AiBll0OBWi6si9Gs

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks