General
-
Target
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434
-
Size
935KB
-
Sample
221125-s27nzabh7z
-
MD5
c486166aba82048e504f9000e6e630e2
-
SHA1
74d24425666774aff61f5a8d0310aaeb6acca401
-
SHA256
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434
-
SHA512
7d041238ed6087dada6d092eebf1b54d49f72082baabfd41be0743e82352b18840c89602420001a2c470f92c13121a115dc42f1ab83de1ab5287795edb4514a4
-
SSDEEP
12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4Z:JyHv5Z+Wzv7AiBll0OBWi6si9GQ
Static task
static1
Behavioral task
behavioral1
Sample
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434
-
Size
935KB
-
MD5
c486166aba82048e504f9000e6e630e2
-
SHA1
74d24425666774aff61f5a8d0310aaeb6acca401
-
SHA256
1b462a11ee9ccefa33be4500d50186162d556026ee52b7b53bbec7e1e1995434
-
SHA512
7d041238ed6087dada6d092eebf1b54d49f72082baabfd41be0743e82352b18840c89602420001a2c470f92c13121a115dc42f1ab83de1ab5287795edb4514a4
-
SSDEEP
12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4Z:JyHv5Z+Wzv7AiBll0OBWi6si9GQ
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-