General
-
Target
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b
-
Size
931KB
-
Sample
221125-rz9vwaec44
-
MD5
52ef8102284442f867fcb0c115a09e74
-
SHA1
10b7abff8298ed405a39828b0746d24045f8528b
-
SHA256
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b
-
SHA512
7d7f9087918e2fe0888659b4690b68606ffc962c36a7873ed410b1cf3aa2e939b4ac980df988433ec413f8ebc2cb5b031d70b1bcfd02f43f1a1d4304999a6fbc
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKc:C6j19rut7FoU56e
Static task
static1
Behavioral task
behavioral1
Sample
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b
-
Size
931KB
-
MD5
52ef8102284442f867fcb0c115a09e74
-
SHA1
10b7abff8298ed405a39828b0746d24045f8528b
-
SHA256
322cbe2f13b8c685b3710767d014298ecebc240c8d29f62eb928290dcc63079b
-
SHA512
7d7f9087918e2fe0888659b4690b68606ffc962c36a7873ed410b1cf3aa2e939b4ac980df988433ec413f8ebc2cb5b031d70b1bcfd02f43f1a1d4304999a6fbc
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKc:C6j19rut7FoU56e
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-