General
-
Target
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589
-
Size
139KB
-
Sample
221002-swgwcseadl
-
MD5
6b9f08c4190f3eb93de7834a2cee3663
-
SHA1
c1712700c829722baa61f22535160d3c872c57fe
-
SHA256
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589
-
SHA512
adca44ef0b771fa25ccf64d84414b4fefb255473d9e5ae0e702296bb060a3e33d060c9051eff097b233523ba83b5a0008702e09efb391f52d818b60c864040cf
-
SSDEEP
1536:xvrUJTPeMZ0YXKzsr3sxg995rFrdDiDgjJVh+XnHWa9wo:do3G3i5rFyaJufH
Static task
static1
Behavioral task
behavioral1
Sample
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589
-
Size
139KB
-
MD5
6b9f08c4190f3eb93de7834a2cee3663
-
SHA1
c1712700c829722baa61f22535160d3c872c57fe
-
SHA256
c7fb3196c17e15d1b5ccd8e9a895cbe21b988bf03b47ae9155b79408c4db7589
-
SHA512
adca44ef0b771fa25ccf64d84414b4fefb255473d9e5ae0e702296bb060a3e33d060c9051eff097b233523ba83b5a0008702e09efb391f52d818b60c864040cf
-
SSDEEP
1536:xvrUJTPeMZ0YXKzsr3sxg995rFrdDiDgjJVh+XnHWa9wo:do3G3i5rFyaJufH
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-