General
-
Target
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e
-
Size
1.2MB
-
Sample
221126-2gyd8sac95
-
MD5
4d06ebd81268bcee1e7c220ac966be0a
-
SHA1
a7478f16782861d8e9d32030dfe645fd92c84d47
-
SHA256
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e
-
SHA512
21c8360834bae532cfe3055109051b8011d1ec8575b40464d771e50669b02a96ceb6c27e6d2d57fa695ac35199cf3f53e284e81409c9a459249c744d9906d2a2
-
SSDEEP
24576:bCStj/R+pud1sQN6TgXxruXQNjj43/qq:9r0C/5XIANvM
Static task
static1
Behavioral task
behavioral1
Sample
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e
-
Size
1.2MB
-
MD5
4d06ebd81268bcee1e7c220ac966be0a
-
SHA1
a7478f16782861d8e9d32030dfe645fd92c84d47
-
SHA256
4a1a90f6d6bcd00c4acd70079c62fef320a07b9a5822aeba31e3003bae92c54e
-
SHA512
21c8360834bae532cfe3055109051b8011d1ec8575b40464d771e50669b02a96ceb6c27e6d2d57fa695ac35199cf3f53e284e81409c9a459249c744d9906d2a2
-
SSDEEP
24576:bCStj/R+pud1sQN6TgXxruXQNjj43/qq:9r0C/5XIANvM
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-