General
-
Target
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568
-
Size
931KB
-
Sample
221125-pppqvage58
-
MD5
b42f4fa7e40cc6a65df0fe2d215beefe
-
SHA1
be1258a0b5f7e68aa6ef31e9ef0c9e715b4f19ad
-
SHA256
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568
-
SHA512
9ef85d042be87932845ebfe345606868d06a1a0ac45311a3a81821eb399037a38f058168c916f673b92549b4e61ab7d52f77bb40d532b6f87ec0db4407c34142
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56
Static task
static1
Behavioral task
behavioral1
Sample
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568
-
Size
931KB
-
MD5
b42f4fa7e40cc6a65df0fe2d215beefe
-
SHA1
be1258a0b5f7e68aa6ef31e9ef0c9e715b4f19ad
-
SHA256
6405be01e96a00b0b6c9d1ca8fceeab2936ca3d858bee9258713ccd477af1568
-
SHA512
9ef85d042be87932845ebfe345606868d06a1a0ac45311a3a81821eb399037a38f058168c916f673b92549b4e61ab7d52f77bb40d532b6f87ec0db4407c34142
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-