General
-
Target
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173
-
Size
1.2MB
-
Sample
221127-a6vwvsgf42
-
MD5
ccb3294ea728ebf0d3f770c87dd90e59
-
SHA1
7fd47812645ba50131ea9963d6de9c26e8bcb7e7
-
SHA256
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173
-
SHA512
bdd5e0d07d8e2dec31bd10bdb06c42eb87a5ba159dd554dae4a13cf4180d5ff462d7100e28dc79c90ae6f80898c1b9b7f5dfca81ce8089eaba4a84d45e7cb5c2
-
SSDEEP
24576:7CStj/R+pud1sQN6TgXxruXQNjj43/qqh:dr0C/5XIANvMh
Static task
static1
Behavioral task
behavioral1
Sample
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173
-
Size
1.2MB
-
MD5
ccb3294ea728ebf0d3f770c87dd90e59
-
SHA1
7fd47812645ba50131ea9963d6de9c26e8bcb7e7
-
SHA256
8d6d63c63e4541336d65113d363932bb66d872dd6907a1152e6b981b767e8173
-
SHA512
bdd5e0d07d8e2dec31bd10bdb06c42eb87a5ba159dd554dae4a13cf4180d5ff462d7100e28dc79c90ae6f80898c1b9b7f5dfca81ce8089eaba4a84d45e7cb5c2
-
SSDEEP
24576:7CStj/R+pud1sQN6TgXxruXQNjj43/qqh:dr0C/5XIANvMh
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-