General
-
Target
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514
-
Size
508KB
-
Sample
220731-23tyyaddbq
-
MD5
5978aacb831bffcba163c62ab77563fa
-
SHA1
97d325ea7f0d196f60269854ee090a119940908a
-
SHA256
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514
-
SHA512
68d6226ff7cf443efb33b04beec9a99ddd3137bc6d4759dc36e4623619742aae712562af08b58148e30d05d2e34c8cbcb9f57d5434cdeebeb8b9158c4c6f03a3
Static task
static1
Behavioral task
behavioral1
Sample
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514
-
Size
508KB
-
MD5
5978aacb831bffcba163c62ab77563fa
-
SHA1
97d325ea7f0d196f60269854ee090a119940908a
-
SHA256
5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514
-
SHA512
68d6226ff7cf443efb33b04beec9a99ddd3137bc6d4759dc36e4623619742aae712562af08b58148e30d05d2e34c8cbcb9f57d5434cdeebeb8b9158c4c6f03a3
-
Modifies firewall policy service
-
Sets file execution options in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-