General
-
Target
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4
-
Size
331KB
-
Sample
220720-wbje8sdggq
-
MD5
6d0e4c5ef82e34b53b10552094a5f274
-
SHA1
c081c29c5ea4e1dd29d39c533c2fc50edb5a1287
-
SHA256
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4
-
SHA512
cdba1676ca6f79d082602a2ed3111879154f9f2bba8e221e8520bbdc642514915926aac8c4f55832039ba842aef1296aac7293aba6ad4ba5ac95019fcf54af87
Behavioral task
behavioral1
Sample
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4
-
Size
331KB
-
MD5
6d0e4c5ef82e34b53b10552094a5f274
-
SHA1
c081c29c5ea4e1dd29d39c533c2fc50edb5a1287
-
SHA256
4e66403a14ee87c5b62f4bfbb511ea97dcb025ff83046396e19a68010a1504c4
-
SHA512
cdba1676ca6f79d082602a2ed3111879154f9f2bba8e221e8520bbdc642514915926aac8c4f55832039ba842aef1296aac7293aba6ad4ba5ac95019fcf54af87
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-