General

  • Target

    5fe02f579dd6a1e5db5a69c1586c53d9184a8cc7907089d1555a454ee2e4784f

  • Size

    931KB

  • Sample

    221125-pv5dgscb5v

  • MD5

    a5dd1d11299c524282b5b0c279f4cf05

  • SHA1

    4cefc0ce9187700658fe621892e546eee0713486

  • SHA256

    5fe02f579dd6a1e5db5a69c1586c53d9184a8cc7907089d1555a454ee2e4784f

  • SHA512

    ef62ba11357fbd27d345ba3f3f59de365ffe9f3212b121a19c689ddae901dd31da36b21faefaa95ff2f48abd45069b774786b9800a2c6699c397eff4ce6951e0

  • SSDEEP

    24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKN:i6j19rut7FoU563

Score
8/10
upx

Malware Config

Targets

    • Target

      5fe02f579dd6a1e5db5a69c1586c53d9184a8cc7907089d1555a454ee2e4784f

    • Size

      931KB

    • MD5

      a5dd1d11299c524282b5b0c279f4cf05

    • SHA1

      4cefc0ce9187700658fe621892e546eee0713486

    • SHA256

      5fe02f579dd6a1e5db5a69c1586c53d9184a8cc7907089d1555a454ee2e4784f

    • SHA512

      ef62ba11357fbd27d345ba3f3f59de365ffe9f3212b121a19c689ddae901dd31da36b21faefaa95ff2f48abd45069b774786b9800a2c6699c397eff4ce6951e0

    • SSDEEP

      24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKN:i6j19rut7FoU563

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks