General

  • Target

    39cc52ae0de3fe08fddb4f9f03d2d620c21820bbdccad88192d20ef55155ca65

  • Size

    935KB

  • Sample

    221125-rndnasgf4w

  • MD5

    a0fc55598f9533be29bfa5f5ca74b344

  • SHA1

    8d0ec3a19f5382622bf5ecad3823457b9a683053

  • SHA256

    39cc52ae0de3fe08fddb4f9f03d2d620c21820bbdccad88192d20ef55155ca65

  • SHA512

    f52e9c4b69cb00d4d32c5da62995225c3aacfd32c2d954b1db9f0703f805062236572eccffbdd3d2286660e5ea0f29ae1b5a8278c74dc9a82736845b8214ee19

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:oyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      39cc52ae0de3fe08fddb4f9f03d2d620c21820bbdccad88192d20ef55155ca65

    • Size

      935KB

    • MD5

      a0fc55598f9533be29bfa5f5ca74b344

    • SHA1

      8d0ec3a19f5382622bf5ecad3823457b9a683053

    • SHA256

      39cc52ae0de3fe08fddb4f9f03d2d620c21820bbdccad88192d20ef55155ca65

    • SHA512

      f52e9c4b69cb00d4d32c5da62995225c3aacfd32c2d954b1db9f0703f805062236572eccffbdd3d2286660e5ea0f29ae1b5a8278c74dc9a82736845b8214ee19

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:oyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks