General

  • Target

    86d2237fa0d97bcedb520ce34ed8735deea36fbfdf1f5f8ded884e907b70eff9

  • Size

    1.7MB

  • Sample

    221129-g4qbxsgc4s

  • MD5

    7a7dc8e9c135984d12a179dcea4b6882

  • SHA1

    fa33b00513764a13e80cb84dd409e8b4c21323b6

  • SHA256

    86d2237fa0d97bcedb520ce34ed8735deea36fbfdf1f5f8ded884e907b70eff9

  • SHA512

    544b328e4404d39c902657500ef290776e81b6964db4d3b96a696e67415dd3309a44a51df93153b5b2ee777bcae0547ddb25aed0c7e8e43acdd4df125730a648

  • SSDEEP

    49152:KGCZVJhdKsafhKtGqKIBwiCd99q5sTU83lMq:KGoVQsafUGimU5sTU/q

Score
8/10
upx

Malware Config

Targets

    • Target

      86d2237fa0d97bcedb520ce34ed8735deea36fbfdf1f5f8ded884e907b70eff9

    • Size

      1.7MB

    • MD5

      7a7dc8e9c135984d12a179dcea4b6882

    • SHA1

      fa33b00513764a13e80cb84dd409e8b4c21323b6

    • SHA256

      86d2237fa0d97bcedb520ce34ed8735deea36fbfdf1f5f8ded884e907b70eff9

    • SHA512

      544b328e4404d39c902657500ef290776e81b6964db4d3b96a696e67415dd3309a44a51df93153b5b2ee777bcae0547ddb25aed0c7e8e43acdd4df125730a648

    • SSDEEP

      49152:KGCZVJhdKsafhKtGqKIBwiCd99q5sTU83lMq:KGoVQsafUGimU5sTU/q

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks