General
-
Target
4c1ada730f928cee566838d44c3af5d571bf82223e54bb38869b76fd94d2ee79
-
Size
330KB
-
Sample
220712-jkz35agfdq
-
MD5
7d2696391db0c99e6193bd259cda120a
-
SHA1
3684d7b78a632ad1c71a3417e15b2a2f6695a5fd
-
SHA256
4c1ada730f928cee566838d44c3af5d571bf82223e54bb38869b76fd94d2ee79
-
SHA512
b4b6ccd7fba6177423e353884839828c726d3025f1eeb67f723d6d5cf7efc32c0efe117a054079fbd214d5c858320d6ee4f201ccec431bda81a28e962e2ffaf5
Static task
static1
Behavioral task
behavioral1
Sample
4c1ada730f928cee566838d44c3af5d571bf82223e54bb38869b76fd94d2ee79.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
4c1ada730f928cee566838d44c3af5d571bf82223e54bb38869b76fd94d2ee79
-
Size
330KB
-
MD5
7d2696391db0c99e6193bd259cda120a
-
SHA1
3684d7b78a632ad1c71a3417e15b2a2f6695a5fd
-
SHA256
4c1ada730f928cee566838d44c3af5d571bf82223e54bb38869b76fd94d2ee79
-
SHA512
b4b6ccd7fba6177423e353884839828c726d3025f1eeb67f723d6d5cf7efc32c0efe117a054079fbd214d5c858320d6ee4f201ccec431bda81a28e962e2ffaf5
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-