General
-
Target
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0
-
Size
1015KB
-
Sample
221127-zx6pfadd2x
-
MD5
d34f7c63cb50956d08cee518eea59fdd
-
SHA1
afb64460d0d23ebb820f15f98ff0225702c80c35
-
SHA256
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0
-
SHA512
7ee1940efdddc521c1bd527a0f9192595bf567683a6181491f619421562b04b0762cf4ae5a7a6d2adb8c96770824895a2d3bdec8031f99fab6b7ddf901ad59ba
-
SSDEEP
24576:aUTIcxlECxghXU6C18/SzVckJTxtMN6Jr2lBfYhUOcpupWDNp7iV+:aUJx22zxhckJTxSNc1h9WyS7l
Behavioral task
behavioral1
Sample
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0
-
Size
1015KB
-
MD5
d34f7c63cb50956d08cee518eea59fdd
-
SHA1
afb64460d0d23ebb820f15f98ff0225702c80c35
-
SHA256
a7403c6fb874f43ef97230ea2b56987559834afa7165df05f372911dae954ef0
-
SHA512
7ee1940efdddc521c1bd527a0f9192595bf567683a6181491f619421562b04b0762cf4ae5a7a6d2adb8c96770824895a2d3bdec8031f99fab6b7ddf901ad59ba
-
SSDEEP
24576:aUTIcxlECxghXU6C18/SzVckJTxtMN6Jr2lBfYhUOcpupWDNp7iV+:aUJx22zxhckJTxSNc1h9WyS7l
Score8/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-