General
-
Target
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73
-
Size
931KB
-
Sample
221125-hnf9racg4z
-
MD5
4e00922722e0e30b3be9872c52c04293
-
SHA1
b474ce5d8efd4de88133d92fdb3d86c63d65ba54
-
SHA256
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73
-
SHA512
c5a4b72e852e47eb7af8cffb76586c1316c9b57e797a96a2bdae62ee5b028ad46dc3e9f7a8b52bdc2f627bb5cc22cc714a530613c9e32b015fd548bcca16d94c
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56
Static task
static1
Behavioral task
behavioral1
Sample
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73
-
Size
931KB
-
MD5
4e00922722e0e30b3be9872c52c04293
-
SHA1
b474ce5d8efd4de88133d92fdb3d86c63d65ba54
-
SHA256
e6eb2f1c339ebf8468b1342d997600f03511fc8c3292bbaff5699cfe3a878b73
-
SHA512
c5a4b72e852e47eb7af8cffb76586c1316c9b57e797a96a2bdae62ee5b028ad46dc3e9f7a8b52bdc2f627bb5cc22cc714a530613c9e32b015fd548bcca16d94c
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-