General
-
Target
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6
-
Size
1.2MB
-
Sample
221126-18va8ada5x
-
MD5
cfde3ec067b070bf34a87dfccfa0507d
-
SHA1
3e6e5cf86ef0a4e149a686fe171be9151031fa0a
-
SHA256
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6
-
SHA512
146d0438b006e103b503fec2126a2226185d990cd6be61ae354a3d7c6253baeb4a641f1597d3b527ca6f6a5c19c7705283c711707f08b0cf305b8f300b637bc1
-
SSDEEP
24576:XCStj/R+pud1sQN6TgXxruXQNjj43/qqw:Jr0C/5XIANvMw
Static task
static1
Behavioral task
behavioral1
Sample
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6
-
Size
1.2MB
-
MD5
cfde3ec067b070bf34a87dfccfa0507d
-
SHA1
3e6e5cf86ef0a4e149a686fe171be9151031fa0a
-
SHA256
ff0ff44da534e54ff84848f1d3c5630b7967b5831f2df764c63f67599aff58f6
-
SHA512
146d0438b006e103b503fec2126a2226185d990cd6be61ae354a3d7c6253baeb4a641f1597d3b527ca6f6a5c19c7705283c711707f08b0cf305b8f300b637bc1
-
SSDEEP
24576:XCStj/R+pud1sQN6TgXxruXQNjj43/qqw:Jr0C/5XIANvMw
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-