General
-
Target
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90
-
Size
931KB
-
Sample
221125-rglqbsda28
-
MD5
596a29fbda07f18202a017996d28f8bc
-
SHA1
d8002104689eea878c3d98add48ec34e5e32396e
-
SHA256
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90
-
SHA512
1b52bebfa6fe355c17041a8ada58d4caaa6bf4733bf9e33aa69c8e574a89bf4ad3012f043cd4c316f1b678b07076a980b33518d327c24db06a550f70e4e8138a
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKD:i6j19rut7FoU56d
Static task
static1
Behavioral task
behavioral1
Sample
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90
-
Size
931KB
-
MD5
596a29fbda07f18202a017996d28f8bc
-
SHA1
d8002104689eea878c3d98add48ec34e5e32396e
-
SHA256
3da339df2b0c1863171b006180addf2cefe48a25c6065b049d8d6c352370ae90
-
SHA512
1b52bebfa6fe355c17041a8ada58d4caaa6bf4733bf9e33aa69c8e574a89bf4ad3012f043cd4c316f1b678b07076a980b33518d327c24db06a550f70e4e8138a
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKD:i6j19rut7FoU56d
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-