General

  • Target

    3b43db00c992af23f069b5c5455383f6

  • Size

    14.0MB

  • Sample

    231225-y9q9vabad7

  • MD5

    3b43db00c992af23f069b5c5455383f6

  • SHA1

    54ee7758e66027289142ed1d7f63da8c9837c957

  • SHA256

    6ad114ad60f41d215ff527cb5926fabf9c984c2b6295b9ed8ef6965697560ac3

  • SHA512

    24ee68ad60ec109b5e3bc02f4e946b6c92c1c03e304eefcebf61408ff7cd32edc6bc98e44497591c4935c83b52a9e51d41f5fadff31860b259da6f347cb65b4f

  • SSDEEP

    393216:sVg8R2s8UMRDqvZf5mb+IJtuB2p0CBsYuTx0A8Su:ag8RfiOBBeVAwp0fWA8T

Score
7/10

Malware Config

Targets

    • Target

      CheatEngine.exe

    • Size

      14.1MB

    • MD5

      ddd83e926867bb6702ac9fd6ec498787

    • SHA1

      2c843bc98c6abea15136da0632ac6c45805e534f

    • SHA256

      961cd20daca654599fb48030fe7c8ebb97e5423e44a194899bc93040ec0424c4

    • SHA512

      6d2a6f3a158cebacd96badc136e3541137a0d558e8c0784daa36ac60b86c835cf16818c655700cfbaea72bb18b1a7e12645d7775bea335506a55000dc790f5ec

    • SSDEEP

      393216:kMgXKdo4ykGJ7cVlz3mBw6BPCpstM8DZQXTwys6qoc:HgXKdDAYr70LaytMcF56q9

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks