General
-
Target
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7
-
Size
1.0MB
-
Sample
221127-d3csnafe42
-
MD5
c4fc08a97950cd2453dc2b970b72b32e
-
SHA1
bff65396aa41898e0510be5a737073d2bc03af1b
-
SHA256
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7
-
SHA512
272778348d8987cd3b8455f584503819c7968040aaa24cf187f4568ffba221dd1daeaecdafe08759c6cddd5a9daf8f3fee5e4a9ac89c0585d714b168556c1f8d
-
SSDEEP
24576:DlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+s:BaANaRGRpuHetmGimZs
Static task
static1
Behavioral task
behavioral1
Sample
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7
-
Size
1.0MB
-
MD5
c4fc08a97950cd2453dc2b970b72b32e
-
SHA1
bff65396aa41898e0510be5a737073d2bc03af1b
-
SHA256
57ca4ece939263a56b0a33c15ae0d88fb719eb90baf1e254024c12c5e722dfa7
-
SHA512
272778348d8987cd3b8455f584503819c7968040aaa24cf187f4568ffba221dd1daeaecdafe08759c6cddd5a9daf8f3fee5e4a9ac89c0585d714b168556c1f8d
-
SSDEEP
24576:DlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+s:BaANaRGRpuHetmGimZs
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-