General
-
Target
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97
-
Size
853KB
-
Sample
221127-fq5zsafa7z
-
MD5
550eed3c204eeb96149c55609bdfd1fa
-
SHA1
d7489d8077c21c6e941ae188eb83c62fad99f6ce
-
SHA256
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97
-
SHA512
4f409a598a7c9214171ea6b8802a821a3fd6923647ea53f4cd9d2b52fffe7ed48fcf4db24af63462514bac962f6a133e2a6af7bd8d395e44fb07bf966a16af75
-
SSDEEP
24576:1Yq2/9nnr5cDNsOQfKJL9ki1arPvi/cjaBYfvX:mqaxyDC2JmSoPvikO8X
Static task
static1
Behavioral task
behavioral1
Sample
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97
-
Size
853KB
-
MD5
550eed3c204eeb96149c55609bdfd1fa
-
SHA1
d7489d8077c21c6e941ae188eb83c62fad99f6ce
-
SHA256
add41ab2a1dca8f127fead20a6611e41d47d8896dc8bfd7b9296b6682ff67e97
-
SHA512
4f409a598a7c9214171ea6b8802a821a3fd6923647ea53f4cd9d2b52fffe7ed48fcf4db24af63462514bac962f6a133e2a6af7bd8d395e44fb07bf966a16af75
-
SSDEEP
24576:1Yq2/9nnr5cDNsOQfKJL9ki1arPvi/cjaBYfvX:mqaxyDC2JmSoPvikO8X
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-