General

  • Target

    53a4dad5183b933843b71a8cb0ceb12bbc87978793ddaa67faf4bb911f51e8c1

  • Size

    935KB

  • Sample

    221125-qfhfvade7x

  • MD5

    622b23a2f681b76b33e9026a890e88c1

  • SHA1

    5d11b58f631d31e62930125eb231866d8ab6a7a6

  • SHA256

    53a4dad5183b933843b71a8cb0ceb12bbc87978793ddaa67faf4bb911f51e8c1

  • SHA512

    4d22b40c81b1cd8f60341727a56a27e7079b3e9b95cadf20c13145b4acf2f8a4c63c58bf74bc1bddbd509d0d27df94246d6e8132986bdfef54e58dbd01515284

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4m:oyHv5Z+Wzv7AiBll0OBWi6si9GT

Score
8/10
upx

Malware Config

Targets

    • Target

      53a4dad5183b933843b71a8cb0ceb12bbc87978793ddaa67faf4bb911f51e8c1

    • Size

      935KB

    • MD5

      622b23a2f681b76b33e9026a890e88c1

    • SHA1

      5d11b58f631d31e62930125eb231866d8ab6a7a6

    • SHA256

      53a4dad5183b933843b71a8cb0ceb12bbc87978793ddaa67faf4bb911f51e8c1

    • SHA512

      4d22b40c81b1cd8f60341727a56a27e7079b3e9b95cadf20c13145b4acf2f8a4c63c58bf74bc1bddbd509d0d27df94246d6e8132986bdfef54e58dbd01515284

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4m:oyHv5Z+Wzv7AiBll0OBWi6si9GT

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks