General
-
Target
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad
-
Size
1.0MB
-
Sample
221127-qm8avaed8w
-
MD5
9658bcf135ab718116554b389555418e
-
SHA1
036fadf24b73abb88ddbc31f984e698155f457c7
-
SHA256
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad
-
SHA512
5461dd0b1c6491bc11cddf1d09431daee7f57ea5605b0d39ee1141b61df1f4872640b42012c095609dd338318e50ab4313e719e854ac9234301b8e74a516702b
-
SSDEEP
24576:w0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8AQ:w0guUuT/asgUs
Static task
static1
Behavioral task
behavioral1
Sample
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad
-
Size
1.0MB
-
MD5
9658bcf135ab718116554b389555418e
-
SHA1
036fadf24b73abb88ddbc31f984e698155f457c7
-
SHA256
c44012dc47f31ea273c36f33482f3296c9b6192cb1deaa84dd910f79f644a0ad
-
SHA512
5461dd0b1c6491bc11cddf1d09431daee7f57ea5605b0d39ee1141b61df1f4872640b42012c095609dd338318e50ab4313e719e854ac9234301b8e74a516702b
-
SSDEEP
24576:w0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8AQ:w0guUuT/asgUs
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-