General
-
Target
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0
-
Size
1.0MB
-
Sample
221127-rcplescf24
-
MD5
010232a4ce486ecb2e65cec23a4d2d31
-
SHA1
99ca201ae71cf2592fd0c39a9dda3f6760c3bc0f
-
SHA256
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0
-
SHA512
596d38c90eeee739b365fc2626147fb75539159ddb944ab91491fc3fa2e59543ed00651c303c666610c0c40ec8445cf813ba20aafdd92c15cd63557f659908e9
-
SSDEEP
24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A:A0guUuT/asgU
Static task
static1
Behavioral task
behavioral1
Sample
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0
-
Size
1.0MB
-
MD5
010232a4ce486ecb2e65cec23a4d2d31
-
SHA1
99ca201ae71cf2592fd0c39a9dda3f6760c3bc0f
-
SHA256
49bab30e4f7d62f5b8852bbaac758993c73a318c061f5cf45726ce5762a169e0
-
SHA512
596d38c90eeee739b365fc2626147fb75539159ddb944ab91491fc3fa2e59543ed00651c303c666610c0c40ec8445cf813ba20aafdd92c15cd63557f659908e9
-
SSDEEP
24576:A0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A:A0guUuT/asgU
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-