General

  • Target

    5178e0eac09bbaa083e17e36b1079a2c3199613c4a3c239a88ec5139e61fdd1f

  • Size

    935KB

  • Sample

    221125-qjn3ssaf23

  • MD5

    6b100952882c6f18bcc871c64534dd07

  • SHA1

    c94a75538cbd0b8f522c82526ad80b4b6eac74d0

  • SHA256

    5178e0eac09bbaa083e17e36b1079a2c3199613c4a3c239a88ec5139e61fdd1f

  • SHA512

    afe709ecaacd03ddd2ce05705ea1c048e1b1e078829017e71371a45d9f26e2228dc5caf220123460582711f03b7f481d98a85cd744cfe0f0b7230bef7041cdee

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      5178e0eac09bbaa083e17e36b1079a2c3199613c4a3c239a88ec5139e61fdd1f

    • Size

      935KB

    • MD5

      6b100952882c6f18bcc871c64534dd07

    • SHA1

      c94a75538cbd0b8f522c82526ad80b4b6eac74d0

    • SHA256

      5178e0eac09bbaa083e17e36b1079a2c3199613c4a3c239a88ec5139e61fdd1f

    • SHA512

      afe709ecaacd03ddd2ce05705ea1c048e1b1e078829017e71371a45d9f26e2228dc5caf220123460582711f03b7f481d98a85cd744cfe0f0b7230bef7041cdee

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks