General
-
Target
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00
-
Size
931KB
-
Sample
221125-pssxnsbh9y
-
MD5
8d8fcac00c7f46a2df1b474480308da0
-
SHA1
638982faa802c78230c0755a25afd2d373be4c8c
-
SHA256
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00
-
SHA512
d7dbccd20420d7b71f239148943223ad2e6827688396837aa78b75ffe5913b8c97357a6cb926063081603aa519a273b3442ae6ebda50437bdca4510371d318a4
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56
Static task
static1
Behavioral task
behavioral1
Sample
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00
-
Size
931KB
-
MD5
8d8fcac00c7f46a2df1b474480308da0
-
SHA1
638982faa802c78230c0755a25afd2d373be4c8c
-
SHA256
6199df501a146ad938babf9835a5b2c1c540ce77f99cc5368948747cc40f4b00
-
SHA512
d7dbccd20420d7b71f239148943223ad2e6827688396837aa78b75ffe5913b8c97357a6cb926063081603aa519a273b3442ae6ebda50437bdca4510371d318a4
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK:i6j19rut7FoU56
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-