General
-
Target
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb
-
Size
48KB
-
Sample
221107-a63ayacfcq
-
MD5
0ea795f9d289ef714bc88c509ded98a0
-
SHA1
30b536cf23e62205c988daea178cb6e39df0c92b
-
SHA256
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb
-
SHA512
9661b588c7395b65bc2a4e6ef07679c1eaf5be1c6d80936de205478e6e14adb6431b65046fcea2f5eae3fd8d3907c79443553549a511bff15df5812ef073d8e7
-
SSDEEP
768:NNLBE8Rb3hDIjtSdXHqieKb9nP9LYWGDIniI1:NNL/Rb3VStyeKrYWAW
Static task
static1
Behavioral task
behavioral1
Sample
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb
-
Size
48KB
-
MD5
0ea795f9d289ef714bc88c509ded98a0
-
SHA1
30b536cf23e62205c988daea178cb6e39df0c92b
-
SHA256
a4fcc141750f5a49b3e141431c4222fcc9c502d2f79ccb54bb0023e1882356eb
-
SHA512
9661b588c7395b65bc2a4e6ef07679c1eaf5be1c6d80936de205478e6e14adb6431b65046fcea2f5eae3fd8d3907c79443553549a511bff15df5812ef073d8e7
-
SSDEEP
768:NNLBE8Rb3hDIjtSdXHqieKb9nP9LYWGDIniI1:NNL/Rb3VStyeKrYWAW
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-