General

  • Target

    1d2b873da17f5edf63e423a3bdbaa610d16ff4a1225782650fdeb1db683216f6

  • Size

    935KB

  • Sample

    221125-syh67sbf4w

  • MD5

    c377bf4a8d0a2e17efa70e276ac56840

  • SHA1

    f1b3c51969d8918277a4aec133295e07065a917d

  • SHA256

    1d2b873da17f5edf63e423a3bdbaa610d16ff4a1225782650fdeb1db683216f6

  • SHA512

    3ac050fdbb4bc7892a94dfc4fe8b9a08481ee73816a896f63226e6e6d20d5d4ef10b56800e1edab1841d474896621e02b6c597cac9928d5c2b974aa5c65ecc1b

  • SSDEEP

    12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4D:oyHv5Z+Wzv7AiBll0OBWi6si9Gq

Score
8/10
upx

Malware Config

Targets

    • Target

      1d2b873da17f5edf63e423a3bdbaa610d16ff4a1225782650fdeb1db683216f6

    • Size

      935KB

    • MD5

      c377bf4a8d0a2e17efa70e276ac56840

    • SHA1

      f1b3c51969d8918277a4aec133295e07065a917d

    • SHA256

      1d2b873da17f5edf63e423a3bdbaa610d16ff4a1225782650fdeb1db683216f6

    • SHA512

      3ac050fdbb4bc7892a94dfc4fe8b9a08481ee73816a896f63226e6e6d20d5d4ef10b56800e1edab1841d474896621e02b6c597cac9928d5c2b974aa5c65ecc1b

    • SSDEEP

      12288:o5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4D:oyHv5Z+Wzv7AiBll0OBWi6si9Gq

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks