General
-
Target
1310659c777817b1049c9c792039ea00
-
Size
1.3MB
-
Sample
231224-1cvbcafbfq
-
MD5
1310659c777817b1049c9c792039ea00
-
SHA1
70e9a10954c13f93745256c1c29c02aaf55423db
-
SHA256
28c6379c74433081388fc7b7c0ea067c54df2a33436e52c1f3188a5526d7b53f
-
SHA512
17ca292b9d5482141304db50861675f546f62d7579b54a2caf07f519a0e0c85708ee490665859086c07648c2a84c9180851f6eb12d00456c2846dc7887c7bcad
-
SSDEEP
24576:MK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8g:B6JpC3RLy41aibAiCE1Ps0a1LKD
Static task
static1
Behavioral task
behavioral1
Sample
1310659c777817b1049c9c792039ea00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1310659c777817b1049c9c792039ea00.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
1310659c777817b1049c9c792039ea00
-
Size
1.3MB
-
MD5
1310659c777817b1049c9c792039ea00
-
SHA1
70e9a10954c13f93745256c1c29c02aaf55423db
-
SHA256
28c6379c74433081388fc7b7c0ea067c54df2a33436e52c1f3188a5526d7b53f
-
SHA512
17ca292b9d5482141304db50861675f546f62d7579b54a2caf07f519a0e0c85708ee490665859086c07648c2a84c9180851f6eb12d00456c2846dc7887c7bcad
-
SSDEEP
24576:MK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8g:B6JpC3RLy41aibAiCE1Ps0a1LKD
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-