General
-
Target
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5
-
Size
160KB
-
Sample
221107-tl51wahdbq
-
MD5
0816c0b45add832e917dfe70fbd048af
-
SHA1
522d686ebff5e9075cbc4e2c6e39869fbc8a7e50
-
SHA256
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5
-
SHA512
db80cecb7e6ac2348aebf33b33883b39b883768872bf7bdcf72736a4ef8b507b392b20356fab0e835bdbb263eb078f269cdee50c12e122fa786f11337cf933d4
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Static task
static1
Behavioral task
behavioral1
Sample
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5
-
Size
160KB
-
MD5
0816c0b45add832e917dfe70fbd048af
-
SHA1
522d686ebff5e9075cbc4e2c6e39869fbc8a7e50
-
SHA256
1fc26771866526cb19293f19ffde11fe9c833b336cc67af89160607e0f5eb5d5
-
SHA512
db80cecb7e6ac2348aebf33b33883b39b883768872bf7bdcf72736a4ef8b507b392b20356fab0e835bdbb263eb078f269cdee50c12e122fa786f11337cf933d4
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Score8/10-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-