General
-
Target
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932
-
Size
5.2MB
-
Sample
220524-2jsxjaade7
-
MD5
b0a659a40eba8840aa922eb5a757184c
-
SHA1
ae798c27df3021b4b0d2252d956ac2a451c338c0
-
SHA256
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932
-
SHA512
e437f6bc4bb40003207a39973205a92a447aa8e6027543559f80ece48d2b981630fff6e1fa6bbde6e0f58964ff5639712888e2e63ba771f74a9827411e197f1e
Static task
static1
Behavioral task
behavioral1
Sample
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932
-
Size
5.2MB
-
MD5
b0a659a40eba8840aa922eb5a757184c
-
SHA1
ae798c27df3021b4b0d2252d956ac2a451c338c0
-
SHA256
472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932
-
SHA512
e437f6bc4bb40003207a39973205a92a447aa8e6027543559f80ece48d2b981630fff6e1fa6bbde6e0f58964ff5639712888e2e63ba771f74a9827411e197f1e
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-