General

  • Target

    4a3337029b005fdacd2a42c86fdad5ebff7fc0df67f608bc03abf0f6f8909d81

  • Size

    935KB

  • Sample

    221125-qv9tmsbd98

  • MD5

    265e5fdfe9b943c6e7cccd9aa8435174

  • SHA1

    3702763ab4e80a4afa1bc8ae6f3fdc14d02b9abf

  • SHA256

    4a3337029b005fdacd2a42c86fdad5ebff7fc0df67f608bc03abf0f6f8909d81

  • SHA512

    fbd8d6dc9c00199d2ed341de00f7970c120d54996d4319fd1754eafabc98f6964ab48760774059e7f7057a4b90b49a8e8bda0247e2be431db9e84cfd34f2caca

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:JyHv5Z+Wzv7AiBll0OBWi6si9GO

Score
8/10
upx

Malware Config

Targets

    • Target

      4a3337029b005fdacd2a42c86fdad5ebff7fc0df67f608bc03abf0f6f8909d81

    • Size

      935KB

    • MD5

      265e5fdfe9b943c6e7cccd9aa8435174

    • SHA1

      3702763ab4e80a4afa1bc8ae6f3fdc14d02b9abf

    • SHA256

      4a3337029b005fdacd2a42c86fdad5ebff7fc0df67f608bc03abf0f6f8909d81

    • SHA512

      fbd8d6dc9c00199d2ed341de00f7970c120d54996d4319fd1754eafabc98f6964ab48760774059e7f7057a4b90b49a8e8bda0247e2be431db9e84cfd34f2caca

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:JyHv5Z+Wzv7AiBll0OBWi6si9GO

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks