General

  • Target

    b8508026ae39197d6d381259b7e577bc

  • Size

    919KB

  • Sample

    240307-kmjplafe43

  • MD5

    b8508026ae39197d6d381259b7e577bc

  • SHA1

    70429039ef489fc12c5dd5e81ee5abecbfdcc18c

  • SHA256

    8ef134643b209362e8256ed4e4227340e60a7660ef10029f83cedbcd6df83df9

  • SHA512

    7c53d87144ffedbaf1dfe315d3c6fac32edda91e9913405b4c9eeee7993f7004cac1b809e7c37e316c69c60461098671a860265613af5e8e3724636df1daf744

  • SSDEEP

    24576:O2chXEgYJoRNNTQQ1ldiVTzqiCZ+8Pg5B:O2c4onl5epzqiCRPg5B

Score
7/10
upx

Malware Config

Targets

    • Target

      b8508026ae39197d6d381259b7e577bc

    • Size

      919KB

    • MD5

      b8508026ae39197d6d381259b7e577bc

    • SHA1

      70429039ef489fc12c5dd5e81ee5abecbfdcc18c

    • SHA256

      8ef134643b209362e8256ed4e4227340e60a7660ef10029f83cedbcd6df83df9

    • SHA512

      7c53d87144ffedbaf1dfe315d3c6fac32edda91e9913405b4c9eeee7993f7004cac1b809e7c37e316c69c60461098671a860265613af5e8e3724636df1daf744

    • SSDEEP

      24576:O2chXEgYJoRNNTQQ1ldiVTzqiCZ+8Pg5B:O2c4onl5epzqiCRPg5B

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks