General
-
Target
144C0621CA5ECB402DE01D8F10044F92A2EF917522E4B.exe
-
Size
557KB
-
Sample
210801-8ah5yvz9ke
-
MD5
c46f1a56503f218c2977b4b42f5aa84b
-
SHA1
25449ec8c765f94ffc284022374a9139dc46ebef
-
SHA256
144c0621ca5ecb402de01d8f10044f92a2ef917522e4b4955f3760bb17095bac
-
SHA512
b7cc796f0d6940f35a3495502a58bfa9a2f77f95afb41e136fd0431a39094ab88fe0be61ed9f6bcea3953e76fbe24912c0fb01b2019914e5a4284cbb1c1248f6
Static task
static1
Behavioral task
behavioral1
Sample
144C0621CA5ECB402DE01D8F10044F92A2EF917522E4B.exe
Resource
win7v20210410
Malware Config
Targets
-
-
Target
144C0621CA5ECB402DE01D8F10044F92A2EF917522E4B.exe
-
Size
557KB
-
MD5
c46f1a56503f218c2977b4b42f5aa84b
-
SHA1
25449ec8c765f94ffc284022374a9139dc46ebef
-
SHA256
144c0621ca5ecb402de01d8f10044f92a2ef917522e4b4955f3760bb17095bac
-
SHA512
b7cc796f0d6940f35a3495502a58bfa9a2f77f95afb41e136fd0431a39094ab88fe0be61ed9f6bcea3953e76fbe24912c0fb01b2019914e5a4284cbb1c1248f6
-
Modifies firewall policy service
-
suricata: ET MALWARE Win32/Neurevt.A/Betabot Check-in 4
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-