General
-
Target
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0
-
Size
122KB
-
Sample
221107-rka31adeaj
-
MD5
0433c60a249730829b9df7c66585280a
-
SHA1
a578a54514a0faf9f00435d153ec74ccb803f0c4
-
SHA256
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0
-
SHA512
cbdd16addb2c72082b7fdb713225203d6ed6640e9ff827f4f40147ea17830d436a535564536a0a2118b0f9c8d92b0a87e11976d93d9bc42f079456698d230be5
-
SSDEEP
3072:sufO+VTTywpp4PcShif3MKyeI7+uhmqWMGrsN4s/u:9NTywr4vif3MwY+uhfN5G
Static task
static1
Behavioral task
behavioral1
Sample
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0
-
Size
122KB
-
MD5
0433c60a249730829b9df7c66585280a
-
SHA1
a578a54514a0faf9f00435d153ec74ccb803f0c4
-
SHA256
137d99c10c38f42b4db7b6c94376600844bcc2a878d94a31f98982c44b3baee0
-
SHA512
cbdd16addb2c72082b7fdb713225203d6ed6640e9ff827f4f40147ea17830d436a535564536a0a2118b0f9c8d92b0a87e11976d93d9bc42f079456698d230be5
-
SSDEEP
3072:sufO+VTTywpp4PcShif3MKyeI7+uhmqWMGrsN4s/u:9NTywr4vif3MwY+uhfN5G
Score8/10-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-