General

  • Target

    567a0459b0cc6c3e0cbf81e38d45023d0c4271b3a93f7a69a557bd2e8f255be5

  • Size

    935KB

  • Sample

    221125-qa43nadc3t

  • MD5

    bd60f57d121baf81ee8f9adb62796fdd

  • SHA1

    40d7097dd265dd0d303309ce1c6523eb5ae777cc

  • SHA256

    567a0459b0cc6c3e0cbf81e38d45023d0c4271b3a93f7a69a557bd2e8f255be5

  • SHA512

    c57ecbe4ca31d5ae57e7ff6a90a5510a8535b88d5dc0a61dc2b6966cf9aed225138b37317836d1d648ba12ffdfee6889f3af736d01b0dd94bc01778e792e6ffc

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      567a0459b0cc6c3e0cbf81e38d45023d0c4271b3a93f7a69a557bd2e8f255be5

    • Size

      935KB

    • MD5

      bd60f57d121baf81ee8f9adb62796fdd

    • SHA1

      40d7097dd265dd0d303309ce1c6523eb5ae777cc

    • SHA256

      567a0459b0cc6c3e0cbf81e38d45023d0c4271b3a93f7a69a557bd2e8f255be5

    • SHA512

      c57ecbe4ca31d5ae57e7ff6a90a5510a8535b88d5dc0a61dc2b6966cf9aed225138b37317836d1d648ba12ffdfee6889f3af736d01b0dd94bc01778e792e6ffc

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks