General
-
Target
48c7ebdc0c102c3abd3d2ecc8053bc71
-
Size
458KB
-
Sample
240107-m2eejacee5
-
MD5
48c7ebdc0c102c3abd3d2ecc8053bc71
-
SHA1
523c35bbf78ab08359aed26edb275614efadafb4
-
SHA256
f1f655f0db18f12331d348bc39e1f78dbdfc1d91076a6371490a12bc352fbff4
-
SHA512
5990997639b15ca9010117f41f82d28416eefa1912890c112a044b294d3ac0834de1672efaaec424954e88679efee37bc8a3106e02c84c8e728179692ba976c8
-
SSDEEP
12288:mNaGcWVUXtYVpqTuXlgfTzVJ6OnYbI3exOwQO0l:FGcWU9YTqaSXR0RQpl
Static task
static1
Behavioral task
behavioral1
Sample
u999.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
u999.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
u999.exe
-
Size
494KB
-
MD5
dd45ff3b146efdc64efe9213768dd522
-
SHA1
d0bac72aff829455fb02c81be1f15b0d5d2c7f94
-
SHA256
a4b1a761c143af4194d1c909493ea15e544d5f5a9693cab144c673dd6f1cd20d
-
SHA512
036bf4dae20745d2ac53f76c797e4314b46b0b561245c8b098a4a545561a9e9d1341241ae18fd6fb310fcb72b9734e2089061c7d55d3680dfbeb78255aa9956d
-
SSDEEP
6144:NuwdaoWbn0MKjlUlFhKMpq0kuXWFkypBqKSR4G3j0bp3GseGSOweL/M/FiMkx:NmoWbn9zlpqTuXWFrDqKSRdTI3GxOwYX
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-