General

  • Target

    1059bbd0b328d40bfedd712dfd1913fa

  • Size

    666KB

  • Sample

    231225-jr263ageg2

  • MD5

    1059bbd0b328d40bfedd712dfd1913fa

  • SHA1

    310022e2e16fa8e0e024464b35beb15f1280fe6b

  • SHA256

    dd6b05ecbcace43a217cb63c459f43a43f06178903c31628bff1b67db63a1aff

  • SHA512

    13ca2113f2d4f8faac3ae813806aa0cb37a9e07f61ba0cabcaf444c0a17655a5234eb48a4c85b76ef6344381f2a50dd14123a54fb71900389bc6f5476ff338a1

  • SSDEEP

    12288:DbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfh:DXbs48LeP0P8E6dclWLi26KGOqMwIMp

Score
7/10

Malware Config

Targets

    • Target

      1059bbd0b328d40bfedd712dfd1913fa

    • Size

      666KB

    • MD5

      1059bbd0b328d40bfedd712dfd1913fa

    • SHA1

      310022e2e16fa8e0e024464b35beb15f1280fe6b

    • SHA256

      dd6b05ecbcace43a217cb63c459f43a43f06178903c31628bff1b67db63a1aff

    • SHA512

      13ca2113f2d4f8faac3ae813806aa0cb37a9e07f61ba0cabcaf444c0a17655a5234eb48a4c85b76ef6344381f2a50dd14123a54fb71900389bc6f5476ff338a1

    • SSDEEP

      12288:DbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfh:DXbs48LeP0P8E6dclWLi26KGOqMwIMp

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks