General
-
Target
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b
-
Size
1.0MB
-
Sample
221127-j9bf3acb82
-
MD5
3cbfeb076b2f5ec0614e005a617cd5bc
-
SHA1
db84f5e0a519d47357718f50be80fe0164b71c5b
-
SHA256
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b
-
SHA512
c6b55e20cbd6c81fa5f94ac7090262ddd76ae52f1b29d39ce47b837d08095c37d3411f7ed9d78a2159c821a232a8397186839bb7b1265b592322a6d018f5678c
-
SSDEEP
24576:SlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+3:SaANaRGRpuHetmGimZ3
Static task
static1
Behavioral task
behavioral1
Sample
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b
-
Size
1.0MB
-
MD5
3cbfeb076b2f5ec0614e005a617cd5bc
-
SHA1
db84f5e0a519d47357718f50be80fe0164b71c5b
-
SHA256
b1c1113ed02b78cb9bbb57b1967dcea952a6dc7b25ced4dac64c57710969f83b
-
SHA512
c6b55e20cbd6c81fa5f94ac7090262ddd76ae52f1b29d39ce47b837d08095c37d3411f7ed9d78a2159c821a232a8397186839bb7b1265b592322a6d018f5678c
-
SSDEEP
24576:SlafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+3:SaANaRGRpuHetmGimZ3
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-