General
-
Target
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe
-
Size
931KB
-
Sample
221125-m5n35scc36
-
MD5
8eca5cfa1e23c15dde330943f4ab8f2e
-
SHA1
37798ee70a381c01e5460dde091f398ab91515b8
-
SHA256
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe
-
SHA512
899bbe212622caea220420e19b671b2dc273405387320fd84f97a5977573f19fe40706c18fdbb1006e627f1d5e9bb90f47678d87f62ff24803b2525f76a7ca48
-
SSDEEP
24576:y6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKo:y6j19rut7FoU562
Static task
static1
Behavioral task
behavioral1
Sample
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe
-
Size
931KB
-
MD5
8eca5cfa1e23c15dde330943f4ab8f2e
-
SHA1
37798ee70a381c01e5460dde091f398ab91515b8
-
SHA256
864d8571a34446c6a19a756ab300c069c0bccc0a023125f86269614b9f3e2bbe
-
SHA512
899bbe212622caea220420e19b671b2dc273405387320fd84f97a5977573f19fe40706c18fdbb1006e627f1d5e9bb90f47678d87f62ff24803b2525f76a7ca48
-
SSDEEP
24576:y6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKo:y6j19rut7FoU562
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-