General
-
Target
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a
-
Size
1.1MB
-
Sample
221127-q74hdsfh9z
-
MD5
77c96dcbd1ca25f1edf3e7b6df2cbd94
-
SHA1
b0ef3ac708f88059650456fc1fac981ce3679ec9
-
SHA256
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a
-
SHA512
9df7e94d740a67c12242045220768e9806ce3399e369dfebabbe36e88ccb38f6716f96c0d3fe8cc3329bc03d793ee72b830136fccfad9f2b6e597a764f3e820b
-
SSDEEP
24576:o88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wW:o8fRbE2VolvZW
Static task
static1
Behavioral task
behavioral1
Sample
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a
-
Size
1.1MB
-
MD5
77c96dcbd1ca25f1edf3e7b6df2cbd94
-
SHA1
b0ef3ac708f88059650456fc1fac981ce3679ec9
-
SHA256
61a6a43f473ae35571065e9525c94b9993562c9e90a679196658772fb5a1c37a
-
SHA512
9df7e94d740a67c12242045220768e9806ce3399e369dfebabbe36e88ccb38f6716f96c0d3fe8cc3329bc03d793ee72b830136fccfad9f2b6e597a764f3e820b
-
SSDEEP
24576:o88FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wW:o8fRbE2VolvZW
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-