General
-
Target
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280
-
Size
1.0MB
-
Sample
221127-qa7tjsdf2s
-
MD5
1fd79cbce54009b4b36b37878455ee94
-
SHA1
7865ce8d6f1847ee184455dc44573073ab3af3cd
-
SHA256
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280
-
SHA512
65d0ccfc55cd8abf2253b348bd47f212d47cea3b882284cb760945e4cb6c04b1ca3d1e0f552ffae589815a4857811238e1c81b25569580c18f1a50ac02ec03a2
-
SSDEEP
24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A4:A0guUuT/asgUU
Static task
static1
Behavioral task
behavioral1
Sample
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280
-
Size
1.0MB
-
MD5
1fd79cbce54009b4b36b37878455ee94
-
SHA1
7865ce8d6f1847ee184455dc44573073ab3af3cd
-
SHA256
fe5c28f3a0632e6887ad34e4257a3ee5ef9ec170f0f9fd988f5440afa1094280
-
SHA512
65d0ccfc55cd8abf2253b348bd47f212d47cea3b882284cb760945e4cb6c04b1ca3d1e0f552ffae589815a4857811238e1c81b25569580c18f1a50ac02ec03a2
-
SSDEEP
24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A4:A0guUuT/asgUU
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-