General

  • Target

    370c1328cd633c142418fa5a7abd06840f3bfe59f33453b07602cb9e2b1ed3e1

  • Size

    935KB

  • Sample

    221125-rr3ftsdf93

  • MD5

    cf2a2cc852d2604e6f8400c1db82d735

  • SHA1

    80e1b3ec292ac682b5d89f4756d3dc819c3af326

  • SHA256

    370c1328cd633c142418fa5a7abd06840f3bfe59f33453b07602cb9e2b1ed3e1

  • SHA512

    fe30a9ef3458d49d1a71badd04af4d068b104717ca320620616ee832a25a6318aec632585e6461dd485729a1609e618d6cacfbc5d5ec2603ea49acbeafaf08d6

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4l:pyHv5Z+Wzv7AiBll0OBWi6si9Go

Score
8/10
upx

Malware Config

Targets

    • Target

      370c1328cd633c142418fa5a7abd06840f3bfe59f33453b07602cb9e2b1ed3e1

    • Size

      935KB

    • MD5

      cf2a2cc852d2604e6f8400c1db82d735

    • SHA1

      80e1b3ec292ac682b5d89f4756d3dc819c3af326

    • SHA256

      370c1328cd633c142418fa5a7abd06840f3bfe59f33453b07602cb9e2b1ed3e1

    • SHA512

      fe30a9ef3458d49d1a71badd04af4d068b104717ca320620616ee832a25a6318aec632585e6461dd485729a1609e618d6cacfbc5d5ec2603ea49acbeafaf08d6

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4l:pyHv5Z+Wzv7AiBll0OBWi6si9Go

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks