General
-
Target
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7
-
Size
824KB
-
Sample
221030-yfc55agae8
-
MD5
90e59bd02a81259d56b8f03dc589381a
-
SHA1
00dac09b4f5e2e7334168addc2f6e7e6d36c0d6d
-
SHA256
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7
-
SHA512
4acd0648ff8214fd3e1204be83c6bae530287581c93d787cfdf77c176571f97a4b46c27f7833dc84dbf6e242c6c6d6c968a22812e7c3b935d0f54786ad978804
-
SSDEEP
6144:/AXlTcJraBCDorAB2wiAdraBCDoAc769/c:gSraB5graByc769k
Static task
static1
Behavioral task
behavioral1
Sample
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7
-
Size
824KB
-
MD5
90e59bd02a81259d56b8f03dc589381a
-
SHA1
00dac09b4f5e2e7334168addc2f6e7e6d36c0d6d
-
SHA256
b3016eb3459a99d69100f367ca20dc6694110e096adb16662b2ce4175e4c74c7
-
SHA512
4acd0648ff8214fd3e1204be83c6bae530287581c93d787cfdf77c176571f97a4b46c27f7833dc84dbf6e242c6c6d6c968a22812e7c3b935d0f54786ad978804
-
SSDEEP
6144:/AXlTcJraBCDorAB2wiAdraBCDoAc769/c:gSraB5graByc769k
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-