General
-
Target
53dab0fb12afefb47f342c4e76da063251be9e45555a1b7d6fb436a1e7c3b88e
-
Size
271KB
-
Sample
220520-qmbxmsgfar
-
MD5
73cd29e8619a44fe142331c93d8f4dea
-
SHA1
2fa43d3a4af4e477113367e50253b6b8d6456f64
-
SHA256
53dab0fb12afefb47f342c4e76da063251be9e45555a1b7d6fb436a1e7c3b88e
-
SHA512
9560023c59db7e95e9e3654c2013e09ac236730dd420d05087db6e6a6fb0308ddeea9a7b1d24ffead2a5d7fc35dcedd0797f0c0001eb164a8587aa0d1028aa17
Static task
static1
Behavioral task
behavioral1
Sample
dm_2020-08-05_11-59.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
dm_2020-08-05_11-59.exe
-
Size
380KB
-
MD5
cd9cf64a712aaceddaa97147846d1138
-
SHA1
d6a2d0ea670ccbe197b6aabae4f936c78c0fe8ca
-
SHA256
bc7fb2af77215f36ed3e06ffa0082540b39038ec8f85df98a48879d9d942862b
-
SHA512
19455a06f9a1c0db039813284811f123a34f2b14601ec92dd85f86a470b929d7b13f72c50bb27a197db1e0d73439a3e5e38782b1d9efb7a51b759606c2961eef
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-