General

  • Target

    b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e.7z

  • Size

    438KB

  • Sample

    230107-3rz69afa74

  • MD5

    c7f020b6ef4bff3f4a7be50da26c7b89

  • SHA1

    69658e6cf0fd1dfa9f534441feac6721175e96cb

  • SHA256

    b5c951304fdf87699633a30c16a8f986443372c358635c703f35c6f6e06f24b4

  • SHA512

    4db89208447e632abfe44e8be6b8c49f39ab9a4086b22dc26c9455b9e96f78dba75d96309a2c5f522a3c1c064ce370105fb1d49097733e4ccb682b208b3779f7

  • SSDEEP

    6144:p1zYrSLtC2dvYPqGdflWtgD62NtUe3b1akgwqP0H0rETq4Kf2XVlVLI7GkqdV:LzYOtdStWSjT3glP0H0GjFlVBdV

Score
8/10

Malware Config

Targets

    • Target

      b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e

    • Size

      463KB

    • MD5

      26510f4fb2778e0abaf07613321259db

    • SHA1

      bb0b43b556927f838ddb8365058ddbfdd2be5e57

    • SHA256

      b58a2ef01af65d32ca4ba555bd72931dc68728e6d96d8808afca029b4c75d31e

    • SHA512

      154e401582f1f038302c5573586f9f82bb8d4a0a669a8b1fc6a42067cb8fb7bc943feb9d3bd4d01c5525ae9b197633850e5e33b673e5c9a67ff7746a91ec8aa0

    • SSDEEP

      12288:yOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiZ84i31wlEiF4:yq5TfcdHj4fmbfFw+U4

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks