General
-
Target
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5
-
Size
160KB
-
Sample
221004-dz7hvsagdl
-
MD5
30ff3acd8f481f7be4c9e4e6341af425
-
SHA1
87eb5cad82a764e07c690f93aff6fdd6aa6b070d
-
SHA256
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5
-
SHA512
4f1e5c7b1ce0871b809ef095119360bf8343606ccc6118872b92db86d1e3014edbcf1ca0cadc3980beaa16deec458250a6b3562e551cbe78f1d95872d301edf6
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Static task
static1
Behavioral task
behavioral1
Sample
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5
-
Size
160KB
-
MD5
30ff3acd8f481f7be4c9e4e6341af425
-
SHA1
87eb5cad82a764e07c690f93aff6fdd6aa6b070d
-
SHA256
d3916e1f14d4b87efe8ca9a7a53e7f0bf5ccf8f3888c7c865fd3f77bc955f9b5
-
SHA512
4f1e5c7b1ce0871b809ef095119360bf8343606ccc6118872b92db86d1e3014edbcf1ca0cadc3980beaa16deec458250a6b3562e551cbe78f1d95872d301edf6
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Score8/10-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-