General

  • Target

    5ded6890e8f2b0332d0f975216640617982f748611303ece233e7317a7c743eb

  • Size

    931KB

  • Sample

    221125-pypgfahb78

  • MD5

    4d1981698aeeb60eac7c3be83f3eaf6b

  • SHA1

    b2ea8c012b32e55371ceec9e2eb91f4effe8900a

  • SHA256

    5ded6890e8f2b0332d0f975216640617982f748611303ece233e7317a7c743eb

  • SHA512

    17588bbbf15794068803015d7e9f8014061a536399925dcd8bd8d775689fd927ab2a011d163eb206c401c533f7301b842c65b12f571592348af2b811368322e4

  • SSDEEP

    24576:y6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:y6j19rut7FoU56

Score
8/10
upx

Malware Config

Targets

    • Target

      5ded6890e8f2b0332d0f975216640617982f748611303ece233e7317a7c743eb

    • Size

      931KB

    • MD5

      4d1981698aeeb60eac7c3be83f3eaf6b

    • SHA1

      b2ea8c012b32e55371ceec9e2eb91f4effe8900a

    • SHA256

      5ded6890e8f2b0332d0f975216640617982f748611303ece233e7317a7c743eb

    • SHA512

      17588bbbf15794068803015d7e9f8014061a536399925dcd8bd8d775689fd927ab2a011d163eb206c401c533f7301b842c65b12f571592348af2b811368322e4

    • SSDEEP

      24576:y6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:y6j19rut7FoU56

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks