General

  • Target

    5f0132a28cf2bc661ca7a62b37d46ea693f3688d410a254b9b04606c9396a91d

  • Size

    935KB

  • Sample

    221125-pxe7daha96

  • MD5

    7bce9d03613babf39782c114f32cd6d7

  • SHA1

    d72cc3fb56df812f73ed8825ec33a752485a3a93

  • SHA256

    5f0132a28cf2bc661ca7a62b37d46ea693f3688d410a254b9b04606c9396a91d

  • SHA512

    bc5668830bcc3680c303fa60a1aab334a5d63109f756a7de98e1ddc1df2ad0bd5ec6e1b92f1fda750c1a96a054281f81c0e249d71bda7380609df65fb15a589c

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4A:oyHv5Z+Wzv7AiBll0OBWi6si9G1

Score
8/10
upx

Malware Config

Targets

    • Target

      5f0132a28cf2bc661ca7a62b37d46ea693f3688d410a254b9b04606c9396a91d

    • Size

      935KB

    • MD5

      7bce9d03613babf39782c114f32cd6d7

    • SHA1

      d72cc3fb56df812f73ed8825ec33a752485a3a93

    • SHA256

      5f0132a28cf2bc661ca7a62b37d46ea693f3688d410a254b9b04606c9396a91d

    • SHA512

      bc5668830bcc3680c303fa60a1aab334a5d63109f756a7de98e1ddc1df2ad0bd5ec6e1b92f1fda750c1a96a054281f81c0e249d71bda7380609df65fb15a589c

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4A:oyHv5Z+Wzv7AiBll0OBWi6si9G1

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks