General
-
Target
.ex.exe
-
Size
45.6MB
-
Sample
201103-h85t5wspgj
-
MD5
f2f46bb922841aa070af88ff15d05f7f
-
SHA1
916ba7c16e2653830151ecf2e9422c394b89cf2b
-
SHA256
9b49d8e052da018991d668d71f894036f33fc40b95e98ab597de983d8b9c2f53
-
SHA512
9acc15abb410f91f125638076818c7480f2f948491db29c1c793f7d348e9f5932858d47c115f401c606dca2ef75854413ac2c78d448119d211a5c5f37f4d044c
Static task
static1
Malware Config
Targets
-
-
Target
.ex.exe
-
Size
45.6MB
-
MD5
f2f46bb922841aa070af88ff15d05f7f
-
SHA1
916ba7c16e2653830151ecf2e9422c394b89cf2b
-
SHA256
9b49d8e052da018991d668d71f894036f33fc40b95e98ab597de983d8b9c2f53
-
SHA512
9acc15abb410f91f125638076818c7480f2f948491db29c1c793f7d348e9f5932858d47c115f401c606dca2ef75854413ac2c78d448119d211a5c5f37f4d044c
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-