General

  • Target

    5597eb0e93e4d3a10b1e686a701cb4d59ab7f64221a35909d10b7564657a43c3

  • Size

    935KB

  • Sample

    221125-qckrssab53

  • MD5

    ae6072f843b5a62dc01d7354cd0b7c78

  • SHA1

    a6a2ed643d4c8aea13c88beb1c26ad7c227bced1

  • SHA256

    5597eb0e93e4d3a10b1e686a701cb4d59ab7f64221a35909d10b7564657a43c3

  • SHA512

    2c9a313a750e6f35702c0f9f8902165710929d378aa3bebc07b21c369e3b9e3dd4b4ebcdcd90c25840e8256e40e32a692256b93738bc909225c1a3971be06130

  • SSDEEP

    12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x43:IyHv5Z+Wzv7AiBll0OBWi6si9GO

Score
8/10
upx

Malware Config

Targets

    • Target

      5597eb0e93e4d3a10b1e686a701cb4d59ab7f64221a35909d10b7564657a43c3

    • Size

      935KB

    • MD5

      ae6072f843b5a62dc01d7354cd0b7c78

    • SHA1

      a6a2ed643d4c8aea13c88beb1c26ad7c227bced1

    • SHA256

      5597eb0e93e4d3a10b1e686a701cb4d59ab7f64221a35909d10b7564657a43c3

    • SHA512

      2c9a313a750e6f35702c0f9f8902165710929d378aa3bebc07b21c369e3b9e3dd4b4ebcdcd90c25840e8256e40e32a692256b93738bc909225c1a3971be06130

    • SSDEEP

      12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x43:IyHv5Z+Wzv7AiBll0OBWi6si9GO

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks