General
-
Target
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a
-
Size
935KB
-
Sample
221125-qrdl2aec8z
-
MD5
304570eb3e44e633b04ec8d219293154
-
SHA1
14e360399b05c826a059e883afe87036e1e2256e
-
SHA256
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a
-
SHA512
a46d02cc81538fd568f486695e7e76c52b2d9bf1fd87267b8bd442cb33cb1171ec89c09b16b00e520ede87afad8e3bd835505f01fd8fd7b10e67e0f1790c162d
-
SSDEEP
12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G
Static task
static1
Behavioral task
behavioral1
Sample
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a
-
Size
935KB
-
MD5
304570eb3e44e633b04ec8d219293154
-
SHA1
14e360399b05c826a059e883afe87036e1e2256e
-
SHA256
4cf72cf193e2d4e7d1a43ae8d557e9ba09623f7a4de9b2e874d0ec35e6c75a6a
-
SHA512
a46d02cc81538fd568f486695e7e76c52b2d9bf1fd87267b8bd442cb33cb1171ec89c09b16b00e520ede87afad8e3bd835505f01fd8fd7b10e67e0f1790c162d
-
SSDEEP
12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-