General

  • Target

    bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9

  • Size

    6.5MB

  • Sample

    240615-bxrcravakc

  • MD5

    5e5d0725fae73f2339ac8ad604fd8a48

  • SHA1

    0dd3dba62970aab2c59a2269a5e478a6e30cd6f0

  • SHA256

    bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9

  • SHA512

    c583fc74c12eb9cd54596ca47b10bf1c4b3a491d7d2f076e60e685299d1fa25b63f58d8b664ebad0bdc151cf921bff79b758ea7e974aab455198fea6c3256158

  • SSDEEP

    196608:mzUZ+x1t1GshUqgqehvBypSKs3c2SvO+L0mn:VZ+x1t1GshUVlByUKs3cVvOu0mn

Score
8/10

Malware Config

Targets

    • Target

      bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9

    • Size

      6.5MB

    • MD5

      5e5d0725fae73f2339ac8ad604fd8a48

    • SHA1

      0dd3dba62970aab2c59a2269a5e478a6e30cd6f0

    • SHA256

      bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9

    • SHA512

      c583fc74c12eb9cd54596ca47b10bf1c4b3a491d7d2f076e60e685299d1fa25b63f58d8b664ebad0bdc151cf921bff79b758ea7e974aab455198fea6c3256158

    • SSDEEP

      196608:mzUZ+x1t1GshUqgqehvBypSKs3c2SvO+L0mn:VZ+x1t1GshUVlByUKs3cVvOu0mn

    Score
    8/10
    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks