General
-
Target
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13
-
Size
935KB
-
Sample
221125-k8g3wsfe84
-
MD5
4447189146137837b1d76343793fb27f
-
SHA1
443008bf3a800e489a679888db2becfee6bea418
-
SHA256
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13
-
SHA512
ac4aa851bb6a79e4309f4d972abe26dcfe1779c891c1b02685d4851273004d305d4b5849af96c5254668ff9e485132b2eedb59a472ee75f08fd676d5c4e3deae
-
SSDEEP
12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4m:IyHv5Z+Wzv7AiBll0OBWi6si9Gz
Static task
static1
Behavioral task
behavioral1
Sample
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13
-
Size
935KB
-
MD5
4447189146137837b1d76343793fb27f
-
SHA1
443008bf3a800e489a679888db2becfee6bea418
-
SHA256
af7679dd10caed6ab7163007a922b7b604392f0495a406e53bee2f51afa63f13
-
SHA512
ac4aa851bb6a79e4309f4d972abe26dcfe1779c891c1b02685d4851273004d305d4b5849af96c5254668ff9e485132b2eedb59a472ee75f08fd676d5c4e3deae
-
SSDEEP
12288:I5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4m:IyHv5Z+Wzv7AiBll0OBWi6si9Gz
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-