General
-
Target
00401c4ae6d90336e0b74daa4a040f24
-
Size
19KB
-
Sample
231225-c22jyscfg9
-
MD5
00401c4ae6d90336e0b74daa4a040f24
-
SHA1
a64c1c8e69fa7e497224b8cdfe42a1028f320a76
-
SHA256
12d7be6a36738cc1d917f944a7a605c7a2d0b3717afb3376034521b343b21f9a
-
SHA512
8f50452afe3fe872877d347b7613f6833ab0b31b107f004ef6fe5a909007e9af9505c55bc1c6ea46f183187b4851ae1903d5a173c69a645957565d0aba3865a4
-
SSDEEP
384:qmlcZRgl5lbI3vny47444u7d4ygfTlSyZXcpSaTPjbKEmDjhoXDArm7y2:56A5lbIfnyZux0rlSyxgF7j+Jo+m
Static task
static1
Behavioral task
behavioral1
Sample
00401c4ae6d90336e0b74daa4a040f24.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00401c4ae6d90336e0b74daa4a040f24.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
00401c4ae6d90336e0b74daa4a040f24
-
Size
19KB
-
MD5
00401c4ae6d90336e0b74daa4a040f24
-
SHA1
a64c1c8e69fa7e497224b8cdfe42a1028f320a76
-
SHA256
12d7be6a36738cc1d917f944a7a605c7a2d0b3717afb3376034521b343b21f9a
-
SHA512
8f50452afe3fe872877d347b7613f6833ab0b31b107f004ef6fe5a909007e9af9505c55bc1c6ea46f183187b4851ae1903d5a173c69a645957565d0aba3865a4
-
SSDEEP
384:qmlcZRgl5lbI3vny47444u7d4ygfTlSyZXcpSaTPjbKEmDjhoXDArm7y2:56A5lbIfnyZux0rlSyxgF7j+Jo+m
Score8/10-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-