General
-
Target
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f
-
Size
1.0MB
-
Sample
221127-d37b9sbb3y
-
MD5
a58251e908c7e2e339c3ce6db7410858
-
SHA1
892676e525f27eb49a1d1583a66b9aa081a169fd
-
SHA256
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f
-
SHA512
338f81e92cdfa21af9f063319fcc06f3abfcb67c8137fb9ccac4452455067d32e9153f908802fb3e19f231fc3545f4f6d225b408ab61738e9e1cef137ae63236
-
SSDEEP
24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBe:yg+NBOQ9c83D271GA
Static task
static1
Behavioral task
behavioral1
Sample
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f
-
Size
1.0MB
-
MD5
a58251e908c7e2e339c3ce6db7410858
-
SHA1
892676e525f27eb49a1d1583a66b9aa081a169fd
-
SHA256
4faad1bd2f682f07127fdb91617d82d4e17e8c11bc90d83876fe55fe93c4bc9f
-
SHA512
338f81e92cdfa21af9f063319fcc06f3abfcb67c8137fb9ccac4452455067d32e9153f908802fb3e19f231fc3545f4f6d225b408ab61738e9e1cef137ae63236
-
SSDEEP
24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBe:yg+NBOQ9c83D271GA
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-