General

  • Target

    a16cba84a9a0787145eabee0c13ec1e0

  • Size

    935KB

  • Sample

    240224-kh6cssfd8z

  • MD5

    a16cba84a9a0787145eabee0c13ec1e0

  • SHA1

    d2849ccc150dcaa68ff17a1b0786cb90dd56b5f8

  • SHA256

    21a523479d1b153739f3bf2f3f83e3f1a6bcc637bc1a1207b74f02b44c18fa23

  • SHA512

    cdee29c3e9d5e4a828783795e98da2be2dc18ee64a44e65391f1731dbdc8e99a6ff63398a2b99e25be6495ad3e61f2630896f7b78854abe8409a265165d6501a

  • SSDEEP

    12288:F5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4Z:FyHv5Z+Wzv7AiBll0OBWi6si9GU

Score
7/10
upx

Malware Config

Targets

    • Target

      a16cba84a9a0787145eabee0c13ec1e0

    • Size

      935KB

    • MD5

      a16cba84a9a0787145eabee0c13ec1e0

    • SHA1

      d2849ccc150dcaa68ff17a1b0786cb90dd56b5f8

    • SHA256

      21a523479d1b153739f3bf2f3f83e3f1a6bcc637bc1a1207b74f02b44c18fa23

    • SHA512

      cdee29c3e9d5e4a828783795e98da2be2dc18ee64a44e65391f1731dbdc8e99a6ff63398a2b99e25be6495ad3e61f2630896f7b78854abe8409a265165d6501a

    • SSDEEP

      12288:F5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4Z:FyHv5Z+Wzv7AiBll0OBWi6si9GU

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks