General

  • Target

    338c780db6200ed3b0e79582f7e7fdab5042adbff1f14de6f5f55450f0637b17

  • Size

    935KB

  • Sample

    221125-rxz8naea83

  • MD5

    22b57c132595ca3bc91059b33b58cf00

  • SHA1

    b5bacb4c02af53f32dd8739da61c70defb8f319f

  • SHA256

    338c780db6200ed3b0e79582f7e7fdab5042adbff1f14de6f5f55450f0637b17

  • SHA512

    7efa712888b8d5d54792c3dcb8eb5974a17f5cc2dbbcb686ed3e74571870d31bc4c31357dfbb48ab819f67a6bc96e7d94efbaa8b83625a165f79f7bc6bdd0a0c

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x45:pyHv5Z+Wzv7AiBll0OBWi6si9G0

Score
8/10
upx

Malware Config

Targets

    • Target

      338c780db6200ed3b0e79582f7e7fdab5042adbff1f14de6f5f55450f0637b17

    • Size

      935KB

    • MD5

      22b57c132595ca3bc91059b33b58cf00

    • SHA1

      b5bacb4c02af53f32dd8739da61c70defb8f319f

    • SHA256

      338c780db6200ed3b0e79582f7e7fdab5042adbff1f14de6f5f55450f0637b17

    • SHA512

      7efa712888b8d5d54792c3dcb8eb5974a17f5cc2dbbcb686ed3e74571870d31bc4c31357dfbb48ab819f67a6bc96e7d94efbaa8b83625a165f79f7bc6bdd0a0c

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x45:pyHv5Z+Wzv7AiBll0OBWi6si9G0

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks