General
-
Target
0f191fbf06d427352b3850459fe1cb63
-
Size
950KB
-
Sample
231230-fg3s3abah2
-
MD5
0f191fbf06d427352b3850459fe1cb63
-
SHA1
397dfab11c054c9529b660fe5ddb559b6074736c
-
SHA256
20e34141ee4dd72ce763d497738aa6716ec29b3c151019772468247fb3abd253
-
SHA512
a1e55daf868c4e3451e6aa4c9b8e64277a2ba0df5e859e63070250a6061caf707f827096ad1dc4fb501d7fc1fda17e6bc4aace18bd131e24b2347393e87eb2ab
-
SSDEEP
12288:T1l4DIi+3ZfyL8USWIgCaYUuUAiOLeMxBrP0gUFoLsNdzWml4F1Qtl6Y45hLipgj:T1W10SSUYUAiOSMxM3zNl4QnAipgnIol
Static task
static1
Behavioral task
behavioral1
Sample
0f191fbf06d427352b3850459fe1cb63.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f191fbf06d427352b3850459fe1cb63.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
0f191fbf06d427352b3850459fe1cb63
-
Size
950KB
-
MD5
0f191fbf06d427352b3850459fe1cb63
-
SHA1
397dfab11c054c9529b660fe5ddb559b6074736c
-
SHA256
20e34141ee4dd72ce763d497738aa6716ec29b3c151019772468247fb3abd253
-
SHA512
a1e55daf868c4e3451e6aa4c9b8e64277a2ba0df5e859e63070250a6061caf707f827096ad1dc4fb501d7fc1fda17e6bc4aace18bd131e24b2347393e87eb2ab
-
SSDEEP
12288:T1l4DIi+3ZfyL8USWIgCaYUuUAiOLeMxBrP0gUFoLsNdzWml4F1Qtl6Y45hLipgj:T1W10SSUYUAiOSMxM3zNl4QnAipgnIol
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-