General
-
Target
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301
-
Size
35KB
-
Sample
221123-xbw7rsee58
-
MD5
5071b60a51b5483675c21db3cade8ef0
-
SHA1
b119aef357e508473d9c6f7d00cd210969bec527
-
SHA256
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301
-
SHA512
c31b329dea25a85f5a001d4c02cc6a60d4510f546d21ce73fc4a7e2bd5c6c071979b2ca8eea72e1ddd3136bfc2522b279b46d9f625fb33ab47c3639ad528bbae
-
SSDEEP
768:cL0DgpwJ1xm9VMg6XsoQxxB8uF8zBYAhvi:c1wJ1095xxW28CJ
Static task
static1
Behavioral task
behavioral1
Sample
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301
-
Size
35KB
-
MD5
5071b60a51b5483675c21db3cade8ef0
-
SHA1
b119aef357e508473d9c6f7d00cd210969bec527
-
SHA256
4ba2060c3d8f8a124f877587fe887b12ccc1b699b51dcc055574486104776301
-
SHA512
c31b329dea25a85f5a001d4c02cc6a60d4510f546d21ce73fc4a7e2bd5c6c071979b2ca8eea72e1ddd3136bfc2522b279b46d9f625fb33ab47c3639ad528bbae
-
SSDEEP
768:cL0DgpwJ1xm9VMg6XsoQxxB8uF8zBYAhvi:c1wJ1095xxW28CJ
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-