General

  • Target

    5f993c53a89d9e80e1aeea6b55c182a303e8435f315f8ee4063b1f319922253c

  • Size

    935KB

  • Sample

    221125-pwlb1acb7x

  • MD5

    0d71f91fbfc747bc2b4dbf112822039c

  • SHA1

    4b1c8bc477ed3797c583e49fc9b3454caae72d63

  • SHA256

    5f993c53a89d9e80e1aeea6b55c182a303e8435f315f8ee4063b1f319922253c

  • SHA512

    bed9f1dcdd7064206bbfe06e9089c767df910bbf6fddc17a42987a534848b415742067d339c77a9b07933f9547ac2611e309b82538c0ad32269eade3c2879187

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4i:oyHv5Z+Wzv7AiBll0OBWi6si9Gn

Score
8/10
upx

Malware Config

Targets

    • Target

      5f993c53a89d9e80e1aeea6b55c182a303e8435f315f8ee4063b1f319922253c

    • Size

      935KB

    • MD5

      0d71f91fbfc747bc2b4dbf112822039c

    • SHA1

      4b1c8bc477ed3797c583e49fc9b3454caae72d63

    • SHA256

      5f993c53a89d9e80e1aeea6b55c182a303e8435f315f8ee4063b1f319922253c

    • SHA512

      bed9f1dcdd7064206bbfe06e9089c767df910bbf6fddc17a42987a534848b415742067d339c77a9b07933f9547ac2611e309b82538c0ad32269eade3c2879187

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4i:oyHv5Z+Wzv7AiBll0OBWi6si9Gn

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks