General
-
Target
e539edfc388879c786f774a7a7c7a0399f6525820211194f6faad57423417942
-
Size
741KB
-
Sample
220520-17bgqahhej
-
MD5
0e3401b0ddd0f9fd1459420faacc0886
-
SHA1
5e9eb107954805300467a3980dfb8814610b5fef
-
SHA256
e539edfc388879c786f774a7a7c7a0399f6525820211194f6faad57423417942
-
SHA512
86674190091b05272979a61d6b637df1cfeb7d08786c16cbc4e7b822b4adb8bfaeb0c780ecad5068daf61efd4107b0c0d20c78e48b4c4200ce3389627f13010c
Static task
static1
Behavioral task
behavioral1
Sample
AKH8536375001TGz_仰贸易上海有限公司_dwg.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AKH8536375001TGz_仰贸易上海有限公司_dwg.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
AKH8536375001TGz_仰贸易上海有限公司_dwg.exe
-
Size
859KB
-
MD5
a20ed75cdd3f8ce28737aa9fb8a9c3b2
-
SHA1
d8dfa5b7cdea4105f9b5ae5c8d78a4d47b5472c4
-
SHA256
d17de71fad23c19ea4e181c8fe33be0fc230d15be13e6d3c755c77e7ff1519d5
-
SHA512
afb6ab77e640ed37fa11fecdbfb79bdaef331d5dc58e27e73e04ac3d4668bb9d50bd1bfe72eef30dc04e757f61b3dd1b0d50dd1871b597ea08191bc64352c3dd
Score9/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-