General
-
Target
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe
-
Size
1.0MB
-
Sample
221127-j66g2aca67
-
MD5
884df29af48537bdc9e2f20857b09fb1
-
SHA1
650172f92e71473a9cdcb7b3be61b5b1abc47d8a
-
SHA256
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe
-
SHA512
9fabc24dd542cfbf1db2edd6869a36ef9043d739a47ecd9892eff1b1e6202a54587e9996991d7c853234709e88381d19941148169c2eca46bf831a4d648b0a28
-
SSDEEP
24576:ilafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:CaANaRGRpuHetmGimZ
Static task
static1
Behavioral task
behavioral1
Sample
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe
-
Size
1.0MB
-
MD5
884df29af48537bdc9e2f20857b09fb1
-
SHA1
650172f92e71473a9cdcb7b3be61b5b1abc47d8a
-
SHA256
f801d822a7a383d3eba2bab7af1fb001ea1b7cbdb8cd1b32d1764885baa9c1fe
-
SHA512
9fabc24dd542cfbf1db2edd6869a36ef9043d739a47ecd9892eff1b1e6202a54587e9996991d7c853234709e88381d19941148169c2eca46bf831a4d648b0a28
-
SSDEEP
24576:ilafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:CaANaRGRpuHetmGimZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-