General
-
Target
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f
-
Size
1.1MB
-
Sample
221127-zfxp7scb2t
-
MD5
07301ab5c3a85d289fa9a13efae26b25
-
SHA1
cdd1a87c462209cee2bf95f906fbe267635be8a8
-
SHA256
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f
-
SHA512
d2083fa987d2f641191a880a3935f6ed5ea35a601d30b7a465df250a27b710a2848f9d1dcdbbf44d876da6956238b517a8b54ce539d4a2b6b91e0e2d2fb98f7d
-
SSDEEP
24576:NpzaucfNArAjuzOc2X/7aMGutOMIymshUVgrWvfxkE6/:NpzjnMju39Mx8vyfhUVgRB/
Static task
static1
Behavioral task
behavioral1
Sample
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f
-
Size
1.1MB
-
MD5
07301ab5c3a85d289fa9a13efae26b25
-
SHA1
cdd1a87c462209cee2bf95f906fbe267635be8a8
-
SHA256
e16b74a5ee34d384ad065728d716bb774ed25723c6d37045907b44e3d2b9990f
-
SHA512
d2083fa987d2f641191a880a3935f6ed5ea35a601d30b7a465df250a27b710a2848f9d1dcdbbf44d876da6956238b517a8b54ce539d4a2b6b91e0e2d2fb98f7d
-
SSDEEP
24576:NpzaucfNArAjuzOc2X/7aMGutOMIymshUVgrWvfxkE6/:NpzjnMju39Mx8vyfhUVgRB/
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-