General

  • Target

    2a44558ab230a5e2d2e5c43fdd687194590303553e395135a9809898298e6962

  • Size

    931KB

  • Sample

    221125-scamyafa54

  • MD5

    145662b5beded4440c0380cd109e2e55

  • SHA1

    ea35fa987c6f5419a13215931e88ca70d89e36d7

  • SHA256

    2a44558ab230a5e2d2e5c43fdd687194590303553e395135a9809898298e6962

  • SHA512

    0cfd42b5da7cd117795757e1bec2e3a22bdfe36fb57d0681fcc609d9e539c90d60d89751285791e74d5a231b1cc5e2162d8093154851b5564de9c7b8e5cbc6ed

  • SSDEEP

    24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKU:i6j19rut7FoU56+

Score
8/10
upx

Malware Config

Targets

    • Target

      2a44558ab230a5e2d2e5c43fdd687194590303553e395135a9809898298e6962

    • Size

      931KB

    • MD5

      145662b5beded4440c0380cd109e2e55

    • SHA1

      ea35fa987c6f5419a13215931e88ca70d89e36d7

    • SHA256

      2a44558ab230a5e2d2e5c43fdd687194590303553e395135a9809898298e6962

    • SHA512

      0cfd42b5da7cd117795757e1bec2e3a22bdfe36fb57d0681fcc609d9e539c90d60d89751285791e74d5a231b1cc5e2162d8093154851b5564de9c7b8e5cbc6ed

    • SSDEEP

      24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKU:i6j19rut7FoU56+

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks