General
-
Target
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6
-
Size
35KB
-
Sample
221123-lpmdyafd2v
-
MD5
831b3611f33fbfb6596b75a9bd4333bd
-
SHA1
4ea1dd3edb320d27ce08fa9018c9bda0ac99112c
-
SHA256
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6
-
SHA512
baf701f3c5ad5b62d7295029b4601c1bfd3d2b6aad73908436925e600e5000f6015303a445d53e5cba48141a696e6bd6e771631267c6d258ce5df92ebee83b04
-
SSDEEP
384:om32+39If+ZpIWknrBg1H1XbLLQRh02Lqqn2iBdV/02dhzo9TIiXuBcUW:V3ftI4pIWkrBUXLQPpLq7ixznopb6
Static task
static1
Behavioral task
behavioral1
Sample
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6
-
Size
35KB
-
MD5
831b3611f33fbfb6596b75a9bd4333bd
-
SHA1
4ea1dd3edb320d27ce08fa9018c9bda0ac99112c
-
SHA256
106c7ff26c6ffe345b7027caf3ced2714db0e3d31fe0d459a33b74010f6cd8d6
-
SHA512
baf701f3c5ad5b62d7295029b4601c1bfd3d2b6aad73908436925e600e5000f6015303a445d53e5cba48141a696e6bd6e771631267c6d258ce5df92ebee83b04
-
SSDEEP
384:om32+39If+ZpIWknrBg1H1XbLLQRh02Lqqn2iBdV/02dhzo9TIiXuBcUW:V3ftI4pIWkrBUXLQPpLq7ixznopb6
Score8/10-
Adds policy Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-