General

  • Target

    5e66f3417994ba4f0064a1dea3caee09cb1aa08c9d51018caa282c869acd49ae

  • Size

    935KB

  • Sample

    221125-px14vahb44

  • MD5

    85f6f5717131161f4815d362afd8352b

  • SHA1

    3dafb974bbf6ddfb7b490b5a49cdef2da7d989a9

  • SHA256

    5e66f3417994ba4f0064a1dea3caee09cb1aa08c9d51018caa282c869acd49ae

  • SHA512

    d9da2f9c5e99873b82f19ee54738b7b8280b3b5ea12938fe6b2bc129f3b302085bde8c216aa4371fdf37c443ba1f2be48b645bf367cac297dda188d5c462a684

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4w:pyHv5Z+Wzv7AiBll0OBWi6si9G1

Score
8/10
upx

Malware Config

Targets

    • Target

      5e66f3417994ba4f0064a1dea3caee09cb1aa08c9d51018caa282c869acd49ae

    • Size

      935KB

    • MD5

      85f6f5717131161f4815d362afd8352b

    • SHA1

      3dafb974bbf6ddfb7b490b5a49cdef2da7d989a9

    • SHA256

      5e66f3417994ba4f0064a1dea3caee09cb1aa08c9d51018caa282c869acd49ae

    • SHA512

      d9da2f9c5e99873b82f19ee54738b7b8280b3b5ea12938fe6b2bc129f3b302085bde8c216aa4371fdf37c443ba1f2be48b645bf367cac297dda188d5c462a684

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4w:pyHv5Z+Wzv7AiBll0OBWi6si9G1

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks