General

  • Target

    204dbb9888c1b0d6711ef1c8713502d66ef2139b213c1d631888a7d6c9e6c60f

  • Size

    935KB

  • Sample

    221125-ss5s1sbc7s

  • MD5

    359bbdce80f7f7101cc4caf7227952cf

  • SHA1

    dbc889a5da230459eaa9e6f6988aaddd96a00290

  • SHA256

    204dbb9888c1b0d6711ef1c8713502d66ef2139b213c1d631888a7d6c9e6c60f

  • SHA512

    575e1026330323dc6d2bbc9a6591d3c38e2a9e36867b3e87fa39521978181c13cefd62963b01f50d94ed3f27a67328461e5884a58b6e6907462d933c8c58bfd8

  • SSDEEP

    12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      204dbb9888c1b0d6711ef1c8713502d66ef2139b213c1d631888a7d6c9e6c60f

    • Size

      935KB

    • MD5

      359bbdce80f7f7101cc4caf7227952cf

    • SHA1

      dbc889a5da230459eaa9e6f6988aaddd96a00290

    • SHA256

      204dbb9888c1b0d6711ef1c8713502d66ef2139b213c1d631888a7d6c9e6c60f

    • SHA512

      575e1026330323dc6d2bbc9a6591d3c38e2a9e36867b3e87fa39521978181c13cefd62963b01f50d94ed3f27a67328461e5884a58b6e6907462d933c8c58bfd8

    • SSDEEP

      12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks