General
-
Target
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f
-
Size
29KB
-
Sample
221203-xpa7fsfg63
-
MD5
084842f73b70a6fe4c06e634d46add40
-
SHA1
c6d55ff3cd29ce38f3f7ba8eeb56be32a780d4d9
-
SHA256
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f
-
SHA512
cdd13b3f8e0145ba3c4f996513562d6b5128cd7eabfeb6b6c1eb7b5aa2242138666fb0fdadcc59cbf004416641b30f4521d686c5121d8b6d39d847e411b88aa2
-
SSDEEP
768:KOwHtOnvWqkvgYSAbp1+wbsCvfi7iNOMwq430:KOM0WHvbRjbpv0130
Static task
static1
Behavioral task
behavioral1
Sample
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f
-
Size
29KB
-
MD5
084842f73b70a6fe4c06e634d46add40
-
SHA1
c6d55ff3cd29ce38f3f7ba8eeb56be32a780d4d9
-
SHA256
f13ebe26b6ad04400e0465df5d5aa949c8ce7722d21d5c50258fdf07b7821e3f
-
SHA512
cdd13b3f8e0145ba3c4f996513562d6b5128cd7eabfeb6b6c1eb7b5aa2242138666fb0fdadcc59cbf004416641b30f4521d686c5121d8b6d39d847e411b88aa2
-
SSDEEP
768:KOwHtOnvWqkvgYSAbp1+wbsCvfi7iNOMwq430:KOM0WHvbRjbpv0130
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-