General

  • Target

    0f191fbf06d427352b3850459fe1cb63

  • Size

    950KB

  • Sample

    231230-fg3s3abah2

  • MD5

    0f191fbf06d427352b3850459fe1cb63

  • SHA1

    397dfab11c054c9529b660fe5ddb559b6074736c

  • SHA256

    20e34141ee4dd72ce763d497738aa6716ec29b3c151019772468247fb3abd253

  • SHA512

    a1e55daf868c4e3451e6aa4c9b8e64277a2ba0df5e859e63070250a6061caf707f827096ad1dc4fb501d7fc1fda17e6bc4aace18bd131e24b2347393e87eb2ab

  • SSDEEP

    12288:T1l4DIi+3ZfyL8USWIgCaYUuUAiOLeMxBrP0gUFoLsNdzWml4F1Qtl6Y45hLipgj:T1W10SSUYUAiOSMxM3zNl4QnAipgnIol

Score
7/10
upx

Malware Config

Targets

    • Target

      0f191fbf06d427352b3850459fe1cb63

    • Size

      950KB

    • MD5

      0f191fbf06d427352b3850459fe1cb63

    • SHA1

      397dfab11c054c9529b660fe5ddb559b6074736c

    • SHA256

      20e34141ee4dd72ce763d497738aa6716ec29b3c151019772468247fb3abd253

    • SHA512

      a1e55daf868c4e3451e6aa4c9b8e64277a2ba0df5e859e63070250a6061caf707f827096ad1dc4fb501d7fc1fda17e6bc4aace18bd131e24b2347393e87eb2ab

    • SSDEEP

      12288:T1l4DIi+3ZfyL8USWIgCaYUuUAiOLeMxBrP0gUFoLsNdzWml4F1Qtl6Y45hLipgj:T1W10SSUYUAiOSMxM3zNl4QnAipgnIol

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks