General
-
Target
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53
-
Size
1.0MB
-
Sample
221127-dp5araac2v
-
MD5
819e54a57ba6c1866dcf9b2453ee632d
-
SHA1
0c45b5450467469f82d012b1b42afb0a2fbff69e
-
SHA256
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53
-
SHA512
560cf2eb06b4834a184859e588187b88aad607d81ad17e9214aa49100948543a841f467cdb06f664ba4c854aa18a8f3798c1bf84db8f5a926a869aeb03f1878a
-
SSDEEP
24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBI:yg+NBOQ9c83D271GS
Static task
static1
Behavioral task
behavioral1
Sample
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53
-
Size
1.0MB
-
MD5
819e54a57ba6c1866dcf9b2453ee632d
-
SHA1
0c45b5450467469f82d012b1b42afb0a2fbff69e
-
SHA256
c79ba03a53b1e6014263c205f10c02cb874196679c00c2338b5d87cf9c367c53
-
SHA512
560cf2eb06b4834a184859e588187b88aad607d81ad17e9214aa49100948543a841f467cdb06f664ba4c854aa18a8f3798c1bf84db8f5a926a869aeb03f1878a
-
SSDEEP
24576:yO9NENGtIfz4RItOQDlfhG83DAIUnGkJp1GBI:yg+NBOQ9c83D271GS
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-