General
-
Target
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4
-
Size
931KB
-
Sample
221125-sa3wpseh83
-
MD5
d3a149446f01323e560640cdccd0bf9d
-
SHA1
95d260a6493bb5948cd3f687da3a8e3768b8e4a1
-
SHA256
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4
-
SHA512
3206d35a132423471917e7559fd0c9b03ec57a15921e183bfee7b7254c614f2ee4dc6ebc37813817ecab89459a6701533c947cccf61ee2e20667bb65f3c9dbf4
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKQ:C6j19rut7FoU56S
Static task
static1
Behavioral task
behavioral1
Sample
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4
-
Size
931KB
-
MD5
d3a149446f01323e560640cdccd0bf9d
-
SHA1
95d260a6493bb5948cd3f687da3a8e3768b8e4a1
-
SHA256
2af0a3ae7d691fb130760057f3ddc5f17144bad1e6acd5184157d3268ec292a4
-
SHA512
3206d35a132423471917e7559fd0c9b03ec57a15921e183bfee7b7254c614f2ee4dc6ebc37813817ecab89459a6701533c947cccf61ee2e20667bb65f3c9dbf4
-
SSDEEP
24576:C6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YKQ:C6j19rut7FoU56S
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-