General

  • Target

    0e13bbe1ebd26df48f97d07b15e3736c10544662b109321f3c4db5878f785829

  • Size

    935KB

  • Sample

    221125-tn2q8sdf2s

  • MD5

    a3dd517ab24ef76de7ff5c0cc846f2de

  • SHA1

    4ce9bdb609d2fd4ee005b154c468fd9978a8156a

  • SHA256

    0e13bbe1ebd26df48f97d07b15e3736c10544662b109321f3c4db5878f785829

  • SHA512

    c877b783b45acfb60aacdd3969939ab8e1564b527a704dc9e16e1781655b8cb28ea9ec53e09bb8e9a1f50d3928d0d73425a5f7c9c1e0ede062e314294ba18d27

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      0e13bbe1ebd26df48f97d07b15e3736c10544662b109321f3c4db5878f785829

    • Size

      935KB

    • MD5

      a3dd517ab24ef76de7ff5c0cc846f2de

    • SHA1

      4ce9bdb609d2fd4ee005b154c468fd9978a8156a

    • SHA256

      0e13bbe1ebd26df48f97d07b15e3736c10544662b109321f3c4db5878f785829

    • SHA512

      c877b783b45acfb60aacdd3969939ab8e1564b527a704dc9e16e1781655b8cb28ea9ec53e09bb8e9a1f50d3928d0d73425a5f7c9c1e0ede062e314294ba18d27

    • SSDEEP

      12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks