General
-
Target
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9
-
Size
48KB
-
Sample
221107-bbyvpsaef4
-
MD5
01a6343bf5c94faa9a908667d8f7a0c0
-
SHA1
a8c2fef91ac127813f6ae7e83478b7aff0487caf
-
SHA256
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9
-
SHA512
4c2be42832f0fc5d724ad7b52b6ab0f369478942a0d21220e1ae8a3333dd4aff0497936bab5d1ae74458cbf885ce2ab38e6193190004fb51dc8f0ecc7b9bbc78
-
SSDEEP
768:HAtTC5vo1llVIU/8IC3QrVauKOc+vz8538V/TPD+RrpTUb:HAtTkEq+auKwvAJun3
Static task
static1
Behavioral task
behavioral1
Sample
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9
-
Size
48KB
-
MD5
01a6343bf5c94faa9a908667d8f7a0c0
-
SHA1
a8c2fef91ac127813f6ae7e83478b7aff0487caf
-
SHA256
a5c661feb27d574b78eb19cabff274744416ea996660627d12e518828b94c1c9
-
SHA512
4c2be42832f0fc5d724ad7b52b6ab0f369478942a0d21220e1ae8a3333dd4aff0497936bab5d1ae74458cbf885ce2ab38e6193190004fb51dc8f0ecc7b9bbc78
-
SSDEEP
768:HAtTC5vo1llVIU/8IC3QrVauKOc+vz8538V/TPD+RrpTUb:HAtTkEq+auKwvAJun3
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-