General
-
Target
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a
-
Size
34KB
-
Sample
221206-lmw6csee73
-
MD5
41d35b310e3a800383cf9c21b83a1c19
-
SHA1
f49cd06d11d73d4173d73ed9cb297e919ade63a5
-
SHA256
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a
-
SHA512
56b68e0c90030f430393c9980b04fc5de80247a57b66b03812cb0f42818a5607829a0cab33e69140330f06ee42b059c78b0920fee0577ba6647226f99a72368b
-
SSDEEP
768:kOi6PrMmjrYk12zggRJ9sx3vSVl86+txQ1y2AWcQKoQ4:kOijYfaRXcW1+WcQKg
Behavioral task
behavioral1
Sample
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a
-
Size
34KB
-
MD5
41d35b310e3a800383cf9c21b83a1c19
-
SHA1
f49cd06d11d73d4173d73ed9cb297e919ade63a5
-
SHA256
e2e7c218c91c53e4baeb704a5731ee5344ee5d2f8d88c15fe4c63126495c238a
-
SHA512
56b68e0c90030f430393c9980b04fc5de80247a57b66b03812cb0f42818a5607829a0cab33e69140330f06ee42b059c78b0920fee0577ba6647226f99a72368b
-
SSDEEP
768:kOi6PrMmjrYk12zggRJ9sx3vSVl86+txQ1y2AWcQKoQ4:kOijYfaRXcW1+WcQKg
Score8/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-