General
-
Target
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b
-
Size
931KB
-
Sample
221125-lhmq5agc25
-
MD5
7ad4092ee15536ca968a28cba6773af8
-
SHA1
cc279528584b66619b86165830f0944acbcb7eee
-
SHA256
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b
-
SHA512
bd33dfd9888760d563a47ca411c248c99b54c555aa918344a40373374ff1e685422b0a58058563732ca47fd4a410210e4a07c30d3b45838d66ad3f2d3f7b53bb
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56
Static task
static1
Behavioral task
behavioral1
Sample
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b
-
Size
931KB
-
MD5
7ad4092ee15536ca968a28cba6773af8
-
SHA1
cc279528584b66619b86165830f0944acbcb7eee
-
SHA256
a96a8c7791bb18df80ffbd79954a067d58e2c465d9786f7d016854480f7d4d6b
-
SHA512
bd33dfd9888760d563a47ca411c248c99b54c555aa918344a40373374ff1e685422b0a58058563732ca47fd4a410210e4a07c30d3b45838d66ad3f2d3f7b53bb
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:C6j19rut7FoU56
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-