General

  • Target

    3fce900f40d4eac39ca48947679cee529417866a1e41f3e66050d6bcf8e0f4b1

  • Size

    935KB

  • Sample

    221125-rdzg1sga2s

  • MD5

    748f6f2ee3ee026621956552250c3469

  • SHA1

    7e4f7a8cef79c41e78adbf933fc3df1d976fb27d

  • SHA256

    3fce900f40d4eac39ca48947679cee529417866a1e41f3e66050d6bcf8e0f4b1

  • SHA512

    571f295f6f3d655391bacbac79553878047a50e88dcc5e685d69a3e1b81e12d49a03fd2d00166bcf0c605e3dec8cd67290a8393b8b71de646814bf73b10f0e3f

  • SSDEEP

    12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4F:5yHv5Z+Wzv7AiBll0OBWi6si9Gc

Score
8/10
upx

Malware Config

Targets

    • Target

      3fce900f40d4eac39ca48947679cee529417866a1e41f3e66050d6bcf8e0f4b1

    • Size

      935KB

    • MD5

      748f6f2ee3ee026621956552250c3469

    • SHA1

      7e4f7a8cef79c41e78adbf933fc3df1d976fb27d

    • SHA256

      3fce900f40d4eac39ca48947679cee529417866a1e41f3e66050d6bcf8e0f4b1

    • SHA512

      571f295f6f3d655391bacbac79553878047a50e88dcc5e685d69a3e1b81e12d49a03fd2d00166bcf0c605e3dec8cd67290a8393b8b71de646814bf73b10f0e3f

    • SSDEEP

      12288:55Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4F:5yHv5Z+Wzv7AiBll0OBWi6si9Gc

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks