General
-
Target
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b
-
Size
116KB
-
Sample
221201-2e2nwabg3x
-
MD5
67af43d38997e2099ede73c5d931a0d0
-
SHA1
d3e0413ecb952ad96b2c0f79257df820c713ff2a
-
SHA256
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b
-
SHA512
3c8367e2ffe244a69d857d7cbadb3109fc33dca34a68a78878d529c5ddac94c8d50ce018d4a4be25905deb5441e73162c05a0289bfffbac5f3f229dbf3219ef6
-
SSDEEP
1536:YBqn54SVDagbhGpdBiKOvrkipUvfs7GnNXErL:ln535oJrOjkCEUGSL
Static task
static1
Behavioral task
behavioral1
Sample
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b
-
Size
116KB
-
MD5
67af43d38997e2099ede73c5d931a0d0
-
SHA1
d3e0413ecb952ad96b2c0f79257df820c713ff2a
-
SHA256
ed1fa34fb327b913117423b81cbfecd3042cc0380f577590e1a8ce6d98ff654b
-
SHA512
3c8367e2ffe244a69d857d7cbadb3109fc33dca34a68a78878d529c5ddac94c8d50ce018d4a4be25905deb5441e73162c05a0289bfffbac5f3f229dbf3219ef6
-
SSDEEP
1536:YBqn54SVDagbhGpdBiKOvrkipUvfs7GnNXErL:ln535oJrOjkCEUGSL
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-