General

  • Target

    5e4fab21d423613216f4d26388ce1e1e3e7e2956bb2c5b360c30751856e7c986

  • Size

    935KB

  • Sample

    221125-px6pbscc8s

  • MD5

    0004270637ca2929e01ef2c187e63443

  • SHA1

    d743b82a6b87c71f34e76935dafb3e523dccab1f

  • SHA256

    5e4fab21d423613216f4d26388ce1e1e3e7e2956bb2c5b360c30751856e7c986

  • SHA512

    cb83e0cffbcc8a0ca34e73dcd4d007cf6aadb52cd96cba5204965dfdcea8ee5200e58ac01c9e5f9581949b27f685b428b3cc8cdb407ac0c1b9361451d2d04601

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4g:oyHv5Z+Wzv7AiBll0OBWi6si9Gp

Score
8/10
upx

Malware Config

Targets

    • Target

      5e4fab21d423613216f4d26388ce1e1e3e7e2956bb2c5b360c30751856e7c986

    • Size

      935KB

    • MD5

      0004270637ca2929e01ef2c187e63443

    • SHA1

      d743b82a6b87c71f34e76935dafb3e523dccab1f

    • SHA256

      5e4fab21d423613216f4d26388ce1e1e3e7e2956bb2c5b360c30751856e7c986

    • SHA512

      cb83e0cffbcc8a0ca34e73dcd4d007cf6aadb52cd96cba5204965dfdcea8ee5200e58ac01c9e5f9581949b27f685b428b3cc8cdb407ac0c1b9361451d2d04601

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4g:oyHv5Z+Wzv7AiBll0OBWi6si9Gp

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks