General

  • Target

    18360d3eb4c2d85f590ca90308403fefc7b7a6e2be66fdd7c17f9760bde53f78

  • Size

    935KB

  • Sample

    221125-s73bfacd4t

  • MD5

    0645d3d8663bf1cc484ff4c7771e47bc

  • SHA1

    493688af0ce5d23f1de6968fdd0c13227cd8ec07

  • SHA256

    18360d3eb4c2d85f590ca90308403fefc7b7a6e2be66fdd7c17f9760bde53f78

  • SHA512

    d3d017fa202fa5f30e39abd092e1e6c0474d9eef86efe535f3dc8c1ea4dc4a256a31c0b94db658b1d63abb3d09128ddf2e155fc7ebe959ba53b5a617c2fcb2c7

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x42:oyHv5Z+Wzv7AiBll0OBWi6si9G7

Score
8/10
upx

Malware Config

Targets

    • Target

      18360d3eb4c2d85f590ca90308403fefc7b7a6e2be66fdd7c17f9760bde53f78

    • Size

      935KB

    • MD5

      0645d3d8663bf1cc484ff4c7771e47bc

    • SHA1

      493688af0ce5d23f1de6968fdd0c13227cd8ec07

    • SHA256

      18360d3eb4c2d85f590ca90308403fefc7b7a6e2be66fdd7c17f9760bde53f78

    • SHA512

      d3d017fa202fa5f30e39abd092e1e6c0474d9eef86efe535f3dc8c1ea4dc4a256a31c0b94db658b1d63abb3d09128ddf2e155fc7ebe959ba53b5a617c2fcb2c7

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x42:oyHv5Z+Wzv7AiBll0OBWi6si9G7

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks