General

  • Target

    304b7664a3c075c3ea06289b39a5ad3e0b860d2ca0e70723f6f8074888810d9f

  • Size

    935KB

  • Sample

    221125-r3se1aed63

  • MD5

    677d6a045b34d873aae3f4beb335751f

  • SHA1

    648f58acad97f4a848e924a0aeb736523d3cf4db

  • SHA256

    304b7664a3c075c3ea06289b39a5ad3e0b860d2ca0e70723f6f8074888810d9f

  • SHA512

    eae0111380c9f30d429870dfd4a10f56be8c5aaa19095167d1287adf03be62da5369bd95a82a99654996f1352a7f1b56d2ab48525be068c5e8fc8f2b7ef71240

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4S:5yHv5Z+Wzv7AiBll0OBWi6si9Gr

Score
8/10
upx

Malware Config

Targets

    • Target

      304b7664a3c075c3ea06289b39a5ad3e0b860d2ca0e70723f6f8074888810d9f

    • Size

      935KB

    • MD5

      677d6a045b34d873aae3f4beb335751f

    • SHA1

      648f58acad97f4a848e924a0aeb736523d3cf4db

    • SHA256

      304b7664a3c075c3ea06289b39a5ad3e0b860d2ca0e70723f6f8074888810d9f

    • SHA512

      eae0111380c9f30d429870dfd4a10f56be8c5aaa19095167d1287adf03be62da5369bd95a82a99654996f1352a7f1b56d2ab48525be068c5e8fc8f2b7ef71240

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4S:5yHv5Z+Wzv7AiBll0OBWi6si9Gr

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks