General

  • Target

    046c0cd3d882d07c1d26b8b6c97c11b6669ca4bcdfb7399009a9dab0dc6bb213

  • Size

    935KB

  • Sample

    221125-t55jfsbb88

  • MD5

    a29421d4386a6efe19a0a001eb0ae89a

  • SHA1

    cddae06cc69298ac11b53bbdd4ff10dcd5638f45

  • SHA256

    046c0cd3d882d07c1d26b8b6c97c11b6669ca4bcdfb7399009a9dab0dc6bb213

  • SHA512

    6c91701478bdc3893e13e2b2b37ba313a127d02a04d002bdcc4f585be21756fa6c3cb598608f9dc5ac4ab1b1d4ba47bccd1aa2491b34c482dafd7ecd7159d394

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4+:pyHv5Z+Wzv7AiBll0OBWi6si9Gj

Score
8/10
upx

Malware Config

Targets

    • Target

      046c0cd3d882d07c1d26b8b6c97c11b6669ca4bcdfb7399009a9dab0dc6bb213

    • Size

      935KB

    • MD5

      a29421d4386a6efe19a0a001eb0ae89a

    • SHA1

      cddae06cc69298ac11b53bbdd4ff10dcd5638f45

    • SHA256

      046c0cd3d882d07c1d26b8b6c97c11b6669ca4bcdfb7399009a9dab0dc6bb213

    • SHA512

      6c91701478bdc3893e13e2b2b37ba313a127d02a04d002bdcc4f585be21756fa6c3cb598608f9dc5ac4ab1b1d4ba47bccd1aa2491b34c482dafd7ecd7159d394

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4+:pyHv5Z+Wzv7AiBll0OBWi6si9Gj

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks