General

  • Target

    47e401241a7af65af7146dc3ded321f6a516a861474845ba3762bb34a0e0b161

  • Size

    935KB

  • Sample

    221125-qzvkhseh4x

  • MD5

    2606b1fa371f199f4e233169e527b926

  • SHA1

    d8b3fe470b4ca6e6fcfc4f5956df37e3e1316a89

  • SHA256

    47e401241a7af65af7146dc3ded321f6a516a861474845ba3762bb34a0e0b161

  • SHA512

    7c5842a0a80ea6df88a7079bc3f4cfdb9a88d7e1b84b6016937d07320ea87c6719fc86eb949262c0ae4d8ccb8694f073178cb4b8b0162379ed450b5e76abba6e

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4s:oyHv5Z+Wzv7AiBll0OBWi6si9G5

Score
8/10
upx

Malware Config

Targets

    • Target

      47e401241a7af65af7146dc3ded321f6a516a861474845ba3762bb34a0e0b161

    • Size

      935KB

    • MD5

      2606b1fa371f199f4e233169e527b926

    • SHA1

      d8b3fe470b4ca6e6fcfc4f5956df37e3e1316a89

    • SHA256

      47e401241a7af65af7146dc3ded321f6a516a861474845ba3762bb34a0e0b161

    • SHA512

      7c5842a0a80ea6df88a7079bc3f4cfdb9a88d7e1b84b6016937d07320ea87c6719fc86eb949262c0ae4d8ccb8694f073178cb4b8b0162379ed450b5e76abba6e

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4s:oyHv5Z+Wzv7AiBll0OBWi6si9G5

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks