General
-
Target
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947
-
Size
64KB
-
Sample
221002-maal9scbhn
-
MD5
6f776677d97647d8729247fa4dded9e6
-
SHA1
2bab2e248a52f1e379a2594e646c6f03f61ff59a
-
SHA256
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947
-
SHA512
2d466fa1cd1351c6bd257503867f07aee41e67ba1321f1bc55151cec93b805a1d7bab43f97a16083dd22da963985d9739462832adfdda41e0f6a24ce83552081
-
SSDEEP
768:oEwKNmK8DgyADqxTVNWkxqQHGwZPPmn9F5NDlcphU:oEwPbgk15qQHGRV9L
Static task
static1
Behavioral task
behavioral1
Sample
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947
-
Size
64KB
-
MD5
6f776677d97647d8729247fa4dded9e6
-
SHA1
2bab2e248a52f1e379a2594e646c6f03f61ff59a
-
SHA256
3d9e21d34ce08ff6d0537dac909cd7e3edfe672e1486924b336fbc2f5b698947
-
SHA512
2d466fa1cd1351c6bd257503867f07aee41e67ba1321f1bc55151cec93b805a1d7bab43f97a16083dd22da963985d9739462832adfdda41e0f6a24ce83552081
-
SSDEEP
768:oEwKNmK8DgyADqxTVNWkxqQHGwZPPmn9F5NDlcphU:oEwPbgk15qQHGRV9L
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-