General
-
Target
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a
-
Size
103KB
-
Sample
221002-syavtsebcn
-
MD5
75e26b71563c7e820641f1a2b564f64b
-
SHA1
c78faf609ec0b7716f5b7d7f849b515f2f57edc3
-
SHA256
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a
-
SHA512
0feb4a74fa259762e83fb46cfbc99938b86bae4265808670f479e363c48d954614510476dc76d6db9a0ab8dbb28c402d3b9ffa3e3c50da4a7e59e6bc03f546c0
-
SSDEEP
1536:0I4eJV/GJ4jFl+AmAc/BmqRnzGCLyArDf:hJN1BoqcpmqheET
Static task
static1
Behavioral task
behavioral1
Sample
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a
-
Size
103KB
-
MD5
75e26b71563c7e820641f1a2b564f64b
-
SHA1
c78faf609ec0b7716f5b7d7f849b515f2f57edc3
-
SHA256
196f052a5db6a2dab7be2120d377c1299e6fd16e1950a16946061570900d837a
-
SHA512
0feb4a74fa259762e83fb46cfbc99938b86bae4265808670f479e363c48d954614510476dc76d6db9a0ab8dbb28c402d3b9ffa3e3c50da4a7e59e6bc03f546c0
-
SSDEEP
1536:0I4eJV/GJ4jFl+AmAc/BmqRnzGCLyArDf:hJN1BoqcpmqheET
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-