General
-
Target
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f
-
Size
1.0MB
-
Sample
221127-d27lmsfe37
-
MD5
747a9165ec84f99952f94bfe778c5d59
-
SHA1
a4f4c92c66dc0e71a786927e7b45956423c15350
-
SHA256
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f
-
SHA512
bb0bd925cd99cc234ff619672fbd6dd9ccd9c1a651611805ffaf66bfc274eb6fb28cab8e36cde51c44d118e43ef366d984c83cd4bd271e212cd11c9aef4d20ba
-
SSDEEP
24576:CO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBJ:Cg+NBOQ9c83D271Gz
Static task
static1
Behavioral task
behavioral1
Sample
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f
-
Size
1.0MB
-
MD5
747a9165ec84f99952f94bfe778c5d59
-
SHA1
a4f4c92c66dc0e71a786927e7b45956423c15350
-
SHA256
594a8c94b34f93c99da5c46282a670572b5fb5392b0e425380150d9600b06d4f
-
SHA512
bb0bd925cd99cc234ff619672fbd6dd9ccd9c1a651611805ffaf66bfc274eb6fb28cab8e36cde51c44d118e43ef366d984c83cd4bd271e212cd11c9aef4d20ba
-
SSDEEP
24576:CO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBJ:Cg+NBOQ9c83D271Gz
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-