General
-
Target
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca
-
Size
101KB
-
Sample
221003-sl2g1scecq
-
MD5
685e2885632a84615884d3a4313853c6
-
SHA1
2387695b2092ba71dba7f153f8c4cc42bf3371e9
-
SHA256
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca
-
SHA512
57354507281f97df80a3eec051e924338b89950eb6c680d626f0edbd5e52f74ae18152b479f6c373fdd173375f341ecc847646ed343cb0e03c05dc28b14429dd
-
SSDEEP
3072:ScH24GCxnyB9rdrkr3k1p4cq/LNUnAkJ44eCa:V247xnyB9ZflBJgz
Static task
static1
Behavioral task
behavioral1
Sample
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca
-
Size
101KB
-
MD5
685e2885632a84615884d3a4313853c6
-
SHA1
2387695b2092ba71dba7f153f8c4cc42bf3371e9
-
SHA256
0df5fcbaf21a98ad7bbe7b756318ac8e7226c5cae17db15ce3fb749bf42c20ca
-
SHA512
57354507281f97df80a3eec051e924338b89950eb6c680d626f0edbd5e52f74ae18152b479f6c373fdd173375f341ecc847646ed343cb0e03c05dc28b14429dd
-
SSDEEP
3072:ScH24GCxnyB9rdrkr3k1p4cq/LNUnAkJ44eCa:V247xnyB9ZflBJgz
Score8/10-
Adds policy Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-