General
-
Target
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9
-
Size
935KB
-
Sample
221125-qhl7taae53
-
MD5
e3a883218348c83fce7661bb895a6f08
-
SHA1
5d7290727138092f1590ef31ddc759a4ad281404
-
SHA256
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9
-
SHA512
54d3a35be5dcd91ebf122577c5e13752bf43f824a29e8bc14f7d4b2e23cade6fd745180cbdb1934555e3d7a78dc3326982382320271111cbc8bdbccf5815daa1
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4/:pyHv5Z+Wzv7AiBll0OBWi6si9GG
Static task
static1
Behavioral task
behavioral1
Sample
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9
-
Size
935KB
-
MD5
e3a883218348c83fce7661bb895a6f08
-
SHA1
5d7290727138092f1590ef31ddc759a4ad281404
-
SHA256
5284d48931390bb54c93ec51b6f18c72f238402941118ead4154cede612358e9
-
SHA512
54d3a35be5dcd91ebf122577c5e13752bf43f824a29e8bc14f7d4b2e23cade6fd745180cbdb1934555e3d7a78dc3326982382320271111cbc8bdbccf5815daa1
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4/:pyHv5Z+Wzv7AiBll0OBWi6si9GG
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-