General
-
Target
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c
-
Size
56KB
-
Sample
221121-vfykaadf3t
-
MD5
124e701967b92decb50d085a52ebd146
-
SHA1
6759717b7eb7d27afa796a0ec415ea5891084efc
-
SHA256
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c
-
SHA512
c2b0200f7b373c6cdfeb828f21174727a25dc8ab56df2e461743fa8ffefe810f4c2ba0544ca949b4d4d70599dce4c6e2c7e23868331f52b06b20b01533ca4b9f
-
SSDEEP
1536:RHk14yKq8vHIDwOWSbO9bPzqhR9vuWIf:A4y3e9brqhR9vuWIf
Static task
static1
Behavioral task
behavioral1
Sample
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c
-
Size
56KB
-
MD5
124e701967b92decb50d085a52ebd146
-
SHA1
6759717b7eb7d27afa796a0ec415ea5891084efc
-
SHA256
40e47309367875bd35d332863a5b91717734a29d5992ae53b608d2a4c111ef2c
-
SHA512
c2b0200f7b373c6cdfeb828f21174727a25dc8ab56df2e461743fa8ffefe810f4c2ba0544ca949b4d4d70599dce4c6e2c7e23868331f52b06b20b01533ca4b9f
-
SSDEEP
1536:RHk14yKq8vHIDwOWSbO9bPzqhR9vuWIf:A4y3e9brqhR9vuWIf
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-