General
-
Target
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb
-
Size
931KB
-
Sample
221125-pve4lagh67
-
MD5
8390269a1929f136d4a486e2e4f99cbf
-
SHA1
652b28d6edab93874564b8581db501f2922412ea
-
SHA256
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb
-
SHA512
d8de8a826b13c52953a1e1e42fcfac4378ed4392955e5efae433e8ef8117f65c538f8955ef38f006a863bd6d3e66928cdea1b61ec2d04560be2815642e7b1504
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKz:C6j19rut7FoU56p
Static task
static1
Behavioral task
behavioral1
Sample
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb
-
Size
931KB
-
MD5
8390269a1929f136d4a486e2e4f99cbf
-
SHA1
652b28d6edab93874564b8581db501f2922412ea
-
SHA256
604a48ba977b508d482f6d82843b8f524864e8756e29e76cbc25aedf488faedb
-
SHA512
d8de8a826b13c52953a1e1e42fcfac4378ed4392955e5efae433e8ef8117f65c538f8955ef38f006a863bd6d3e66928cdea1b61ec2d04560be2815642e7b1504
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKz:C6j19rut7FoU56p
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-