General
-
Target
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35
-
Size
1.1MB
-
Sample
221127-q6cnaacb52
-
MD5
e86ba8e76bec945d8b3baac68277d1b0
-
SHA1
fbf368ae92b1cbbfcdf3111c8a2b9f9551e37048
-
SHA256
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35
-
SHA512
82e367c596b91dccf8ede2196c3256741fde7e93a19b3e523fc9f8888a638bea38939fad979c0911c4684643c1c30b7f2ce465f23c82d372eb50d840f3d5d141
-
SSDEEP
24576:o88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wW:o8fRbE2VolvZW
Static task
static1
Behavioral task
behavioral1
Sample
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35
-
Size
1.1MB
-
MD5
e86ba8e76bec945d8b3baac68277d1b0
-
SHA1
fbf368ae92b1cbbfcdf3111c8a2b9f9551e37048
-
SHA256
6be423d129490e122f3c1567c656253b780aa069aa9dcd537fda93b7eb4e5b35
-
SHA512
82e367c596b91dccf8ede2196c3256741fde7e93a19b3e523fc9f8888a638bea38939fad979c0911c4684643c1c30b7f2ce465f23c82d372eb50d840f3d5d141
-
SSDEEP
24576:o88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wW:o8fRbE2VolvZW
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-