General

  • Target

    5e35d351f3e684ed3f7ae4cf65e9e0e8a0e81e53e3c1cb6ba5ac1dc73d359fb5

  • Size

    935KB

  • Sample

    221125-pybkkshb57

  • MD5

    bb21f8d89441c680ba4b7a63e072bf0b

  • SHA1

    bf571db5842f4771ee946cd2ccd6fb38da555943

  • SHA256

    5e35d351f3e684ed3f7ae4cf65e9e0e8a0e81e53e3c1cb6ba5ac1dc73d359fb5

  • SHA512

    4f358181f862e710b8beff7c1acb4c999c3d576185d9917fed77718784aa54750eac8379823385989cc8f4d4bedcfde40ef2ebd5e155696489e481ed609caf03

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x41:oyHv5Z+Wzv7AiBll0OBWi6si9Gk

Score
8/10
upx

Malware Config

Targets

    • Target

      5e35d351f3e684ed3f7ae4cf65e9e0e8a0e81e53e3c1cb6ba5ac1dc73d359fb5

    • Size

      935KB

    • MD5

      bb21f8d89441c680ba4b7a63e072bf0b

    • SHA1

      bf571db5842f4771ee946cd2ccd6fb38da555943

    • SHA256

      5e35d351f3e684ed3f7ae4cf65e9e0e8a0e81e53e3c1cb6ba5ac1dc73d359fb5

    • SHA512

      4f358181f862e710b8beff7c1acb4c999c3d576185d9917fed77718784aa54750eac8379823385989cc8f4d4bedcfde40ef2ebd5e155696489e481ed609caf03

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x41:oyHv5Z+Wzv7AiBll0OBWi6si9Gk

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks