General

  • Target

    4a4a38415da08f815279cf7e6eb61a3f4d5bd8d58e51b8e84361a50ac1f4b0ad

  • Size

    935KB

  • Sample

    221125-qv314aee9y

  • MD5

    01d58a4f82ebeb9fcdfc0af68d8f6748

  • SHA1

    ba422a03f9895b4b824589581af4ca1f83146385

  • SHA256

    4a4a38415da08f815279cf7e6eb61a3f4d5bd8d58e51b8e84361a50ac1f4b0ad

  • SHA512

    ffcf626b5b9fc54061ebfbc1abd68d8cf885be2f303d2471a2eb76b284c2fe70fba290a1f776dfc96856840d8636051f31fac70c33f89094f87e78709e0eb83a

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4S:pyHv5Z+Wzv7AiBll0OBWi6si9GX

Score
8/10
upx

Malware Config

Targets

    • Target

      4a4a38415da08f815279cf7e6eb61a3f4d5bd8d58e51b8e84361a50ac1f4b0ad

    • Size

      935KB

    • MD5

      01d58a4f82ebeb9fcdfc0af68d8f6748

    • SHA1

      ba422a03f9895b4b824589581af4ca1f83146385

    • SHA256

      4a4a38415da08f815279cf7e6eb61a3f4d5bd8d58e51b8e84361a50ac1f4b0ad

    • SHA512

      ffcf626b5b9fc54061ebfbc1abd68d8cf885be2f303d2471a2eb76b284c2fe70fba290a1f776dfc96856840d8636051f31fac70c33f89094f87e78709e0eb83a

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4S:pyHv5Z+Wzv7AiBll0OBWi6si9GX

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks