General

  • Target

    6058c5126c5883e8f1a786fdd2f139845f499e0395763d380c68abe2dc2c99d3

  • Size

    935KB

  • Sample

    221125-pvcngaca9v

  • MD5

    90c8b671928af29ba836fb6199ae3ba3

  • SHA1

    e6f37de94b5e946d7f10c82f9fb17b44f04a306f

  • SHA256

    6058c5126c5883e8f1a786fdd2f139845f499e0395763d380c68abe2dc2c99d3

  • SHA512

    4bc8a48e80574098f76382c37038eea3d842b48ba680bef8143f47c363cf079309e4f6383d84b47b8ff0c25703be44a14715d9478ea94d5a7d5d06617e11d752

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x40:JyHv5Z+Wzv7AiBll0OBWi6si9GR

Score
8/10
upx

Malware Config

Targets

    • Target

      6058c5126c5883e8f1a786fdd2f139845f499e0395763d380c68abe2dc2c99d3

    • Size

      935KB

    • MD5

      90c8b671928af29ba836fb6199ae3ba3

    • SHA1

      e6f37de94b5e946d7f10c82f9fb17b44f04a306f

    • SHA256

      6058c5126c5883e8f1a786fdd2f139845f499e0395763d380c68abe2dc2c99d3

    • SHA512

      4bc8a48e80574098f76382c37038eea3d842b48ba680bef8143f47c363cf079309e4f6383d84b47b8ff0c25703be44a14715d9478ea94d5a7d5d06617e11d752

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x40:JyHv5Z+Wzv7AiBll0OBWi6si9GR

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks