General

  • Target

    17c53daecfc1e5111518e08d19325d2905a74883287f3f89edc6b723d23c74cc

  • Size

    935KB

  • Sample

    221125-s8vmzscd9w

  • MD5

    0ee5331c5d8b19d36e02fc7c1d0cc8dd

  • SHA1

    1fb4ae8a3628cee7bed706e973ecfac66ddc76dc

  • SHA256

    17c53daecfc1e5111518e08d19325d2905a74883287f3f89edc6b723d23c74cc

  • SHA512

    37b5f08f319e3ba35a046b514f9bbe89461952b1dc9f62cb8dd8057f20fd17bab11717b8346a035066463e7cc367c05c20529f89603db907fee7fad1b3932cde

  • SSDEEP

    12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x45:ZyHv5Z+Wzv7AiBll0OBWi6si9G4

Score
8/10
upx

Malware Config

Targets

    • Target

      17c53daecfc1e5111518e08d19325d2905a74883287f3f89edc6b723d23c74cc

    • Size

      935KB

    • MD5

      0ee5331c5d8b19d36e02fc7c1d0cc8dd

    • SHA1

      1fb4ae8a3628cee7bed706e973ecfac66ddc76dc

    • SHA256

      17c53daecfc1e5111518e08d19325d2905a74883287f3f89edc6b723d23c74cc

    • SHA512

      37b5f08f319e3ba35a046b514f9bbe89461952b1dc9f62cb8dd8057f20fd17bab11717b8346a035066463e7cc367c05c20529f89603db907fee7fad1b3932cde

    • SSDEEP

      12288:Z5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x45:ZyHv5Z+Wzv7AiBll0OBWi6si9G4

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks