General
-
Target
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371
-
Size
1.0MB
-
Sample
221127-dmkhkaee98
-
MD5
66736faaf495ca53c2e68075ca7e03f5
-
SHA1
80e83e3372d1c47aa00f839cec4ac6c89a2e097e
-
SHA256
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371
-
SHA512
8c32868392ad2718d15e408978d6029bf2bcd97f67acd34c9b16109fd5b7840f64a8f50d876f4dbcc0006b92ca2516db427ac328aac596c2c6ed45c001fa94e1
-
SSDEEP
24576:zlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+Z:RaANaRGRpuHetmGimZZ
Static task
static1
Behavioral task
behavioral1
Sample
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371
-
Size
1.0MB
-
MD5
66736faaf495ca53c2e68075ca7e03f5
-
SHA1
80e83e3372d1c47aa00f839cec4ac6c89a2e097e
-
SHA256
def2d38eb08fe3333992e0431446bd0749ff5b1826e5891c5f3ad3e8f6bee371
-
SHA512
8c32868392ad2718d15e408978d6029bf2bcd97f67acd34c9b16109fd5b7840f64a8f50d876f4dbcc0006b92ca2516db427ac328aac596c2c6ed45c001fa94e1
-
SSDEEP
24576:zlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+Z:RaANaRGRpuHetmGimZZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-