General
-
Target
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df
-
Size
931KB
-
Sample
221125-pl3hjabe31
-
MD5
49d41e7f745a05114865f7d973f70551
-
SHA1
6edd529f84a327ea498b7c0a48910774136c7a58
-
SHA256
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df
-
SHA512
a4fb9951cc6c1914f8211907d1057a340297e9198abef5fa5c67469335b1875cb7c6b7e11adb574bf8df9179cd6956abf889d91bd589da432ee1581b65db8810
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKg:C6j19rut7FoU566
Static task
static1
Behavioral task
behavioral1
Sample
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df
-
Size
931KB
-
MD5
49d41e7f745a05114865f7d973f70551
-
SHA1
6edd529f84a327ea498b7c0a48910774136c7a58
-
SHA256
6623259e6bd900e5e0e526232a202fa4c9e87ea2fc10a47d65a0dee3d44ad5df
-
SHA512
a4fb9951cc6c1914f8211907d1057a340297e9198abef5fa5c67469335b1875cb7c6b7e11adb574bf8df9179cd6956abf889d91bd589da432ee1581b65db8810
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKg:C6j19rut7FoU566
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-