General

  • Target

    4931212c4ffd9196baf744abe52097c3ec34624e9adc2483bf46ed5dff83dc7b

  • Size

    935KB

  • Sample

    221125-qxzfpabf43

  • MD5

    311f48b400d8cdb0088c47c65380110a

  • SHA1

    9f502ca777958d4df793b937aeb0facc38f97be5

  • SHA256

    4931212c4ffd9196baf744abe52097c3ec34624e9adc2483bf46ed5dff83dc7b

  • SHA512

    e3a6c0b0699936ff8d04219274ad11e3e475107520bb594e7a10789a77c67134d9c7c927c48a1841b6c38cb9dc3c6e30469afd53d6ceb7169f98b4bb6bc4aa4b

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4x:JyHv5Z+Wzv7AiBll0OBWi6si9GA

Score
8/10
upx

Malware Config

Targets

    • Target

      4931212c4ffd9196baf744abe52097c3ec34624e9adc2483bf46ed5dff83dc7b

    • Size

      935KB

    • MD5

      311f48b400d8cdb0088c47c65380110a

    • SHA1

      9f502ca777958d4df793b937aeb0facc38f97be5

    • SHA256

      4931212c4ffd9196baf744abe52097c3ec34624e9adc2483bf46ed5dff83dc7b

    • SHA512

      e3a6c0b0699936ff8d04219274ad11e3e475107520bb594e7a10789a77c67134d9c7c927c48a1841b6c38cb9dc3c6e30469afd53d6ceb7169f98b4bb6bc4aa4b

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4x:JyHv5Z+Wzv7AiBll0OBWi6si9GA

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks