General
-
Target
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30
-
Size
931KB
-
Sample
221125-raba1sce33
-
MD5
342c7f930f1ddbb28e9a44e9dce6f2e0
-
SHA1
f696f2bead914ff65f0ff61ce2b81423802251cb
-
SHA256
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30
-
SHA512
7c084f2f8b06cfc81cd72840748a9696caab83271d41a6ea667ccb5baf9f296444ef5077bc9453a8dba43eb8dcbff18f2727a43536f503d385fb3968e17cee43
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKB:i6j19rut7FoU56T
Static task
static1
Behavioral task
behavioral1
Sample
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30
-
Size
931KB
-
MD5
342c7f930f1ddbb28e9a44e9dce6f2e0
-
SHA1
f696f2bead914ff65f0ff61ce2b81423802251cb
-
SHA256
41e3fac8f2ba46c014ae9fd5430290cddf090a98398e08e94dfd1046f860df30
-
SHA512
7c084f2f8b06cfc81cd72840748a9696caab83271d41a6ea667ccb5baf9f296444ef5077bc9453a8dba43eb8dcbff18f2727a43536f503d385fb3968e17cee43
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKB:i6j19rut7FoU56T
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-