General
-
Target
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90
-
Size
1.1MB
-
Sample
221127-kt1axsdf34
-
MD5
43bd9bfcb6558aaa3870d92a458eb3b4
-
SHA1
5f9a6c1ce3d1326e2f4fe96287f995a8ff913f64
-
SHA256
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90
-
SHA512
c7e246d7434a3065c4e620755bb00fdc67c09261058e02574b38078d6758d8003e8cbb1a01f0cce165d7121e25759aeca8cccb9173dafa5d23f4e6e133af8f52
-
SSDEEP
24576:I88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wWG:I8fRbE2VolvZWG
Static task
static1
Behavioral task
behavioral1
Sample
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90
-
Size
1.1MB
-
MD5
43bd9bfcb6558aaa3870d92a458eb3b4
-
SHA1
5f9a6c1ce3d1326e2f4fe96287f995a8ff913f64
-
SHA256
bbed69d47e47a43cdb99de293bb7f17f97beaf1ca2d7dbf390850a569834ae90
-
SHA512
c7e246d7434a3065c4e620755bb00fdc67c09261058e02574b38078d6758d8003e8cbb1a01f0cce165d7121e25759aeca8cccb9173dafa5d23f4e6e133af8f52
-
SSDEEP
24576:I88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wWG:I8fRbE2VolvZWG
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-