General

  • Target

    5d3f7d424ea15ecc349623de954df32cf8ce24f2fb1cc271b231401d20412ab4

  • Size

    935KB

  • Sample

    221125-pzyrhahc87

  • MD5

    b151498efe71c32bb73eff559ccd9d5f

  • SHA1

    5a0bb7962bc9919465687591bf7d2b0c4fc8a438

  • SHA256

    5d3f7d424ea15ecc349623de954df32cf8ce24f2fb1cc271b231401d20412ab4

  • SHA512

    f5f5a8a346a63518f04c796a0b845f1601b81a4dcef6d3da68bb2ec0f3de61b85094763d69d670023b78d8e5743a192bd53b94f8e9284e490d184abb1cad17a4

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4q:pyHv5Z+Wzv7AiBll0OBWi6si9GD

Score
8/10
upx

Malware Config

Targets

    • Target

      5d3f7d424ea15ecc349623de954df32cf8ce24f2fb1cc271b231401d20412ab4

    • Size

      935KB

    • MD5

      b151498efe71c32bb73eff559ccd9d5f

    • SHA1

      5a0bb7962bc9919465687591bf7d2b0c4fc8a438

    • SHA256

      5d3f7d424ea15ecc349623de954df32cf8ce24f2fb1cc271b231401d20412ab4

    • SHA512

      f5f5a8a346a63518f04c796a0b845f1601b81a4dcef6d3da68bb2ec0f3de61b85094763d69d670023b78d8e5743a192bd53b94f8e9284e490d184abb1cad17a4

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4q:pyHv5Z+Wzv7AiBll0OBWi6si9GD

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks