General
-
Target
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391
-
Size
935KB
-
Sample
221125-psnyqagg62
-
MD5
4aa6cfbce1610b6110c9c2d36710e939
-
SHA1
000d093fb552d3c50211525249ab5aa98c309cba
-
SHA256
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391
-
SHA512
55b676bc6b568a1e36964934237f490903488c7c01cd4b2d651f73a15ebf75966c136317be53defa6fe81dc5f5cff695f12de004374335bb3ec9663cac689055
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G
Static task
static1
Behavioral task
behavioral1
Sample
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391
-
Size
935KB
-
MD5
4aa6cfbce1610b6110c9c2d36710e939
-
SHA1
000d093fb552d3c50211525249ab5aa98c309cba
-
SHA256
61b5a598787ce5c204b482cc37130ac83acb5b30f8fd7802690a86c826c6f391
-
SHA512
55b676bc6b568a1e36964934237f490903488c7c01cd4b2d651f73a15ebf75966c136317be53defa6fe81dc5f5cff695f12de004374335bb3ec9663cac689055
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:pyHv5Z+Wzv7AiBll0OBWi6si9G
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-