General
-
Target
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06
-
Size
1.0MB
-
Sample
221127-dyashaag4x
-
MD5
709d948c0a9d5c5b7c4546563765d3e6
-
SHA1
2aff141e375611a934f490a6e2d6295e1eb65119
-
SHA256
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06
-
SHA512
02e695257b3f1e0c30ed28b3a65dee0f54188b73bd8cc411cd350d478283f9208f8560e481ce87510edf45f4b858495f518782b921ff46d50c333ac5e4d06b9a
-
SSDEEP
24576:SZafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:SaANaRGRpuHetmGimZ
Static task
static1
Behavioral task
behavioral1
Sample
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06
-
Size
1.0MB
-
MD5
709d948c0a9d5c5b7c4546563765d3e6
-
SHA1
2aff141e375611a934f490a6e2d6295e1eb65119
-
SHA256
7fef9fedf2b0d857a95c41bc610996d5c7119dc34b8770f69a311697b1079f06
-
SHA512
02e695257b3f1e0c30ed28b3a65dee0f54188b73bd8cc411cd350d478283f9208f8560e481ce87510edf45f4b858495f518782b921ff46d50c333ac5e4d06b9a
-
SSDEEP
24576:SZafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:SaANaRGRpuHetmGimZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-