General
-
Target
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082
-
Size
588KB
-
Sample
221107-h7jtzsgcbl
-
MD5
34ece152ae0ff65beba8d75e6e2df865
-
SHA1
28f4c70c2c2539675f36104d8af9d0295eba2c53
-
SHA256
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082
-
SHA512
b6d745d0e3575b54f33a3026246455f05d4efc499945f2d922f2d421fc6a737b8b1110265db35ecbad0e5f55d846a9d16a223855c2963ad1d3d2aba9ccdda6af
-
SSDEEP
12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN
Static task
static1
Behavioral task
behavioral1
Sample
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082
-
Size
588KB
-
MD5
34ece152ae0ff65beba8d75e6e2df865
-
SHA1
28f4c70c2c2539675f36104d8af9d0295eba2c53
-
SHA256
abb1859cdcba4a86a6bec40526102abb5e5e7320138135092e8b836cc64a6082
-
SHA512
b6d745d0e3575b54f33a3026246455f05d4efc499945f2d922f2d421fc6a737b8b1110265db35ecbad0e5f55d846a9d16a223855c2963ad1d3d2aba9ccdda6af
-
SSDEEP
12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-