General

  • Target

    61cb00ec2031041167d11d17b0559b250a59b3f10ee2bb5835b278aee6b90340

  • Size

    931KB

  • Sample

    221125-pslhlabh9t

  • MD5

    670381646973be7d853c39844cdf4c57

  • SHA1

    ed71edeed0b443761864302e80d04c130740fc46

  • SHA256

    61cb00ec2031041167d11d17b0559b250a59b3f10ee2bb5835b278aee6b90340

  • SHA512

    e8c471b50acaa895dcf913f03ac99a8661bf84b67c1c520dc0ca8d70838936a4f1a9c762ff95c9af160bb2ba0da0466e93b3b7f0628e100cb5384ab119b661b7

  • SSDEEP

    24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKp:i6j19rut7FoU56z

Score
8/10
upx

Malware Config

Targets

    • Target

      61cb00ec2031041167d11d17b0559b250a59b3f10ee2bb5835b278aee6b90340

    • Size

      931KB

    • MD5

      670381646973be7d853c39844cdf4c57

    • SHA1

      ed71edeed0b443761864302e80d04c130740fc46

    • SHA256

      61cb00ec2031041167d11d17b0559b250a59b3f10ee2bb5835b278aee6b90340

    • SHA512

      e8c471b50acaa895dcf913f03ac99a8661bf84b67c1c520dc0ca8d70838936a4f1a9c762ff95c9af160bb2ba0da0466e93b3b7f0628e100cb5384ab119b661b7

    • SSDEEP

      24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKp:i6j19rut7FoU56z

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks