General
-
Target
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b
-
Size
1.0MB
-
Sample
221127-kczcascd89
-
MD5
f472e20c461fa18a68f8522a3c14427b
-
SHA1
b2751f692d637e912092633bfe5c0ed22bfe2155
-
SHA256
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b
-
SHA512
e9e314cecd76908b802c38221e0fbc0c52e4b72b8179c931e872bbddbc1a072065f388a3f7d4fa02c86250c2471644acfbf273cc57418cd999c7ffbfcefa7a81
-
SSDEEP
24576:ClafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:iaANaRGRpuHetmGimZ
Static task
static1
Behavioral task
behavioral1
Sample
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b
-
Size
1.0MB
-
MD5
f472e20c461fa18a68f8522a3c14427b
-
SHA1
b2751f692d637e912092633bfe5c0ed22bfe2155
-
SHA256
4161363a46a136c7c520053b201cf138f75d4bfd6c8517f9ce3dcd7762858f3b
-
SHA512
e9e314cecd76908b802c38221e0fbc0c52e4b72b8179c931e872bbddbc1a072065f388a3f7d4fa02c86250c2471644acfbf273cc57418cd999c7ffbfcefa7a81
-
SSDEEP
24576:ClafNPaNMDJOpKROZRpulZBVOkeOLimGHCmO+:iaANaRGRpuHetmGimZ
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-