General

  • Target

    298c718b28ecf32483727f51a76ebaca11a096ca48c9e034133054cb5e5d41c8

  • Size

    935KB

  • Sample

    221125-sdf64sfb25

  • MD5

    fb47bd7eeb64c4c66e717a63cb1c71bf

  • SHA1

    e3c5a1d9214c6d891b089c93844f00436cc6bbfd

  • SHA256

    298c718b28ecf32483727f51a76ebaca11a096ca48c9e034133054cb5e5d41c8

  • SHA512

    511ef0d93e029ef93652f39cf8cc2d3d0db9f4a214a24e359dc4efd77ef2897eb594bd5e02a030bf0c52fa21d725627ee1947ae4f6f9dce887ac446ffbd56f38

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      298c718b28ecf32483727f51a76ebaca11a096ca48c9e034133054cb5e5d41c8

    • Size

      935KB

    • MD5

      fb47bd7eeb64c4c66e717a63cb1c71bf

    • SHA1

      e3c5a1d9214c6d891b089c93844f00436cc6bbfd

    • SHA256

      298c718b28ecf32483727f51a76ebaca11a096ca48c9e034133054cb5e5d41c8

    • SHA512

      511ef0d93e029ef93652f39cf8cc2d3d0db9f4a214a24e359dc4efd77ef2897eb594bd5e02a030bf0c52fa21d725627ee1947ae4f6f9dce887ac446ffbd56f38

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks