General

  • Target

    0c717260dd5b1d24678d03c3cca5d61e4c31bbb2bacbb534b7fa74e825bffe15

  • Size

    935KB

  • Sample

    221125-tq8mkaae43

  • MD5

    d006f9a858e07c78f1f11fd4344e5d9f

  • SHA1

    d24fea1c32ccd9750bc34be29786ddfe207a5120

  • SHA256

    0c717260dd5b1d24678d03c3cca5d61e4c31bbb2bacbb534b7fa74e825bffe15

  • SHA512

    c22fb93efab3eb51248326de06bc953e46bf8bd089d24d8498d9dfb18016cfffd54b3b59c739da1ef14037befd0b0342db40b0295b564b3376cc96ffb6b89e5b

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4v:JyHv5Z+Wzv7AiBll0OBWi6si9Gq

Score
8/10
upx

Malware Config

Targets

    • Target

      0c717260dd5b1d24678d03c3cca5d61e4c31bbb2bacbb534b7fa74e825bffe15

    • Size

      935KB

    • MD5

      d006f9a858e07c78f1f11fd4344e5d9f

    • SHA1

      d24fea1c32ccd9750bc34be29786ddfe207a5120

    • SHA256

      0c717260dd5b1d24678d03c3cca5d61e4c31bbb2bacbb534b7fa74e825bffe15

    • SHA512

      c22fb93efab3eb51248326de06bc953e46bf8bd089d24d8498d9dfb18016cfffd54b3b59c739da1ef14037befd0b0342db40b0295b564b3376cc96ffb6b89e5b

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4v:JyHv5Z+Wzv7AiBll0OBWi6si9Gq

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks