General

  • Target

    0ca9bd0ab6acfb88c35f7416d9302808

  • Size

    958KB

  • Sample

    231230-drv5vscgh4

  • MD5

    0ca9bd0ab6acfb88c35f7416d9302808

  • SHA1

    4ab757f7940b03a8a7ee6509bc7200e8cffc9287

  • SHA256

    2416d2399dd96e6d22f7acce0a37bb1473ef3b3d2471d44168f7e5d268747691

  • SHA512

    1794d60e4ce154c8301b8e6bebb2608f73b67fa882a2b2d0940e95b6172aea9111e4f16b9cfc72efca356ee089c388e084814e28f05a3d7c4a70d10b95d6041c

  • SSDEEP

    24576:y9+z4WWD6/G3a72nsZTHZROn7MjX/C++u0+jJhkCaE:y9+z4Witq7IGZRO7oXD0+1hwE

Score
7/10
upx

Malware Config

Targets

    • Target

      0ca9bd0ab6acfb88c35f7416d9302808

    • Size

      958KB

    • MD5

      0ca9bd0ab6acfb88c35f7416d9302808

    • SHA1

      4ab757f7940b03a8a7ee6509bc7200e8cffc9287

    • SHA256

      2416d2399dd96e6d22f7acce0a37bb1473ef3b3d2471d44168f7e5d268747691

    • SHA512

      1794d60e4ce154c8301b8e6bebb2608f73b67fa882a2b2d0940e95b6172aea9111e4f16b9cfc72efca356ee089c388e084814e28f05a3d7c4a70d10b95d6041c

    • SSDEEP

      24576:y9+z4WWD6/G3a72nsZTHZROn7MjX/C++u0+jJhkCaE:y9+z4Witq7IGZRO7oXD0+1hwE

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks