General
-
Target
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1
-
Size
935KB
-
Sample
221125-qr9dpsbb99
-
MD5
f697a36331533f69a11b4b1df2daeb82
-
SHA1
76118a5cb8e2b8ee2a5311a3666cb741ac1098c1
-
SHA256
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1
-
SHA512
4c0263c9843af2d7788f027c6307923d09e9d36dd8dd1be09755a0e853c5af9ee6b5c9614a4d20427cdaa8507ad473f7648efc717c6ef695e9e13fda1cf242f3
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:pyHv5Z+Wzv7AiBll0OBWi6si9Gy
Static task
static1
Behavioral task
behavioral1
Sample
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1
-
Size
935KB
-
MD5
f697a36331533f69a11b4b1df2daeb82
-
SHA1
76118a5cb8e2b8ee2a5311a3666cb741ac1098c1
-
SHA256
4c5c233b0ec2dc7324943dc529a95b9a0e2c95e844b207f79a37e6e738fe58a1
-
SHA512
4c0263c9843af2d7788f027c6307923d09e9d36dd8dd1be09755a0e853c5af9ee6b5c9614a4d20427cdaa8507ad473f7648efc717c6ef695e9e13fda1cf242f3
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4P:pyHv5Z+Wzv7AiBll0OBWi6si9Gy
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-