General
-
Target
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209
-
Size
38KB
-
Sample
221205-p5t1hafc41
-
MD5
0a9acf2df91bf9829b307b4c92f491bd
-
SHA1
1203692395da93f07c4deae49a051addd7cb40a1
-
SHA256
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209
-
SHA512
4cde75cd10a5a3a7436061ad67ed913ed704fca7fd6ff8258896cf26700aed45695f0294f763d9d835a98fcb9c2a24b2fecc78ad7b506e3b07c71be27dcb0039
-
SSDEEP
768:qZrumNmZiBaR6hz8cAwssQAEE7GvSLWXanqyoO0qoGcCw+zNcT868R8Z8s888m8b:qdNmZiBaR6hz8cAwssQAEE7GvSLWXanV
Static task
static1
Behavioral task
behavioral1
Sample
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209
-
Size
38KB
-
MD5
0a9acf2df91bf9829b307b4c92f491bd
-
SHA1
1203692395da93f07c4deae49a051addd7cb40a1
-
SHA256
8d33e937be653c0416264c4bfcdde675618746e392fd5d72d7059ec4000e1209
-
SHA512
4cde75cd10a5a3a7436061ad67ed913ed704fca7fd6ff8258896cf26700aed45695f0294f763d9d835a98fcb9c2a24b2fecc78ad7b506e3b07c71be27dcb0039
-
SSDEEP
768:qZrumNmZiBaR6hz8cAwssQAEE7GvSLWXanqyoO0qoGcCw+zNcT868R8Z8s888m8b:qdNmZiBaR6hz8cAwssQAEE7GvSLWXanV
Score8/10-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-