General
-
Target
Exotic.exe
-
Size
7.3MB
-
Sample
220708-m1v1wsbhar
-
MD5
5677e0d59fea82ee3429ce9c4e8134a4
-
SHA1
80e74985ff0e651a9cd18298614fa0994cb6c183
-
SHA256
0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7
-
SHA512
5e649c4886fedb75f1f4d5751fafc78557669c6a0d885ff2ff8dce530ef3dd19059d809c3ca284b25773de01fc83fc4009ef38c394eec0d2db2165a737679341
Static task
static1
Behavioral task
behavioral1
Sample
Exotic.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Exotic.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Exotic.exe
-
Size
7.3MB
-
MD5
5677e0d59fea82ee3429ce9c4e8134a4
-
SHA1
80e74985ff0e651a9cd18298614fa0994cb6c183
-
SHA256
0f0ec79102ad1d811ab4f978214b43703aa8542f3815629b830c5aa520de5ad7
-
SHA512
5e649c4886fedb75f1f4d5751fafc78557669c6a0d885ff2ff8dce530ef3dd19059d809c3ca284b25773de01fc83fc4009ef38c394eec0d2db2165a737679341
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-