General
-
Target
1efb79881431d2efa05df52579a10b3a73a465f38c90b3eef43a0d354e3ef3b1
-
Size
784KB
-
Sample
220612-x3274acgbl
-
MD5
88c1b8ca147452ffc9b32b158f551495
-
SHA1
035c681a8b86ebd0d5f3bc1daeee6d29bb115aec
-
SHA256
1efb79881431d2efa05df52579a10b3a73a465f38c90b3eef43a0d354e3ef3b1
-
SHA512
01226d7a21d529442cb64bb2d1c902819c45fed9332d3a5cee1b6945e4ed8c0d6c7260f60219035bf056a76720a6f50ef67748ebe573d24ce8ec2c65b1fc3571
Static task
static1
Behavioral task
behavioral1
Sample
1efb79881431d2efa05df52579a10b3a73a465f38c90b3eef43a0d354e3ef3b1.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
1efb79881431d2efa05df52579a10b3a73a465f38c90b3eef43a0d354e3ef3b1
-
Size
784KB
-
MD5
88c1b8ca147452ffc9b32b158f551495
-
SHA1
035c681a8b86ebd0d5f3bc1daeee6d29bb115aec
-
SHA256
1efb79881431d2efa05df52579a10b3a73a465f38c90b3eef43a0d354e3ef3b1
-
SHA512
01226d7a21d529442cb64bb2d1c902819c45fed9332d3a5cee1b6945e4ed8c0d6c7260f60219035bf056a76720a6f50ef67748ebe573d24ce8ec2c65b1fc3571
-
Adds policy Run key to start application
-
Drops startup file
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-