General
-
Target
4808e4827af90aac55907f6b42d03212
-
Size
238KB
-
Sample
240107-e5krqaffa9
-
MD5
4808e4827af90aac55907f6b42d03212
-
SHA1
afd3ac1028f67bee539695610861e21e88342b35
-
SHA256
6e978191d50bf2a183f52554429ddcf9a54aa4e28f896eb5735ae85e65fde0a2
-
SHA512
347c73d09f7ab976fb01d62702ac4c196491f6e2fdbba5d02928ff576c45a8120cd5b13475e7b2d2e025eab0b2059cf7579a41fc8b6a3f353da6b4a70c4184a1
-
SSDEEP
6144:1fV+5wALtS2tLYxVQxi73vRvDhKngvHDp6jToSk:1IlLzmxV+i73vCnOyToSk
Behavioral task
behavioral1
Sample
4808e4827af90aac55907f6b42d03212.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4808e4827af90aac55907f6b42d03212.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
4808e4827af90aac55907f6b42d03212
-
Size
238KB
-
MD5
4808e4827af90aac55907f6b42d03212
-
SHA1
afd3ac1028f67bee539695610861e21e88342b35
-
SHA256
6e978191d50bf2a183f52554429ddcf9a54aa4e28f896eb5735ae85e65fde0a2
-
SHA512
347c73d09f7ab976fb01d62702ac4c196491f6e2fdbba5d02928ff576c45a8120cd5b13475e7b2d2e025eab0b2059cf7579a41fc8b6a3f353da6b4a70c4184a1
-
SSDEEP
6144:1fV+5wALtS2tLYxVQxi73vRvDhKngvHDp6jToSk:1IlLzmxV+i73vCnOyToSk
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-