General

  • Target

    137d2e70a06b6f4b313b323c7be617b3

  • Size

    50KB

  • Sample

    231230-ke5l4abcam

  • MD5

    137d2e70a06b6f4b313b323c7be617b3

  • SHA1

    22f4ecf5cba50554812e9847551f5c0c82e5ff6d

  • SHA256

    461b31224c1ec35c9577cf09c82dce5689fd58f087c1e687d3937c643693aea9

  • SHA512

    44b0876ee5f75f2ee0821693876dd6595793088e4dc385c8f054cc7a022f4cf1a146bc9dfa70702db9ce726760ba093d81462c5ee7f8d0685fd315ada89d2cf5

  • SSDEEP

    1536:3nQ5F+U+337lxJpKE5gJLcxB3pwEidGkq5:3Q5kU+Zpz54wtOEmNq5

Score
7/10

Malware Config

Targets

    • Target

      137d2e70a06b6f4b313b323c7be617b3

    • Size

      50KB

    • MD5

      137d2e70a06b6f4b313b323c7be617b3

    • SHA1

      22f4ecf5cba50554812e9847551f5c0c82e5ff6d

    • SHA256

      461b31224c1ec35c9577cf09c82dce5689fd58f087c1e687d3937c643693aea9

    • SHA512

      44b0876ee5f75f2ee0821693876dd6595793088e4dc385c8f054cc7a022f4cf1a146bc9dfa70702db9ce726760ba093d81462c5ee7f8d0685fd315ada89d2cf5

    • SSDEEP

      1536:3nQ5F+U+337lxJpKE5gJLcxB3pwEidGkq5:3Q5kU+Zpz54wtOEmNq5

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.