General
-
Target
7fc1d0b73a0003f8da7c2434259d8b28
-
Size
238KB
-
Sample
240129-nxh3laaefr
-
MD5
7fc1d0b73a0003f8da7c2434259d8b28
-
SHA1
f91b4ffc50e11fc13884c98aa303973fb29039dd
-
SHA256
45cdf5841c2fa78cc444a0926fd3b9e7fab51d061988c45bc894ebb09991bc5d
-
SHA512
68475d89314d4273af8c01e5c71d39230d2c3fcb2d53048ed003d44d63f8270d9f8cd0c4858fad778ea0c460adf42c3e6f4aef7b255c09b717e84ce8b5d58db9
-
SSDEEP
6144:tB27VZ3oMfRczHKW826U0l78ajUdsB+sBT:tBev4wRg7E8KUOFB
Behavioral task
behavioral1
Sample
7fc1d0b73a0003f8da7c2434259d8b28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fc1d0b73a0003f8da7c2434259d8b28.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
7fc1d0b73a0003f8da7c2434259d8b28
-
Size
238KB
-
MD5
7fc1d0b73a0003f8da7c2434259d8b28
-
SHA1
f91b4ffc50e11fc13884c98aa303973fb29039dd
-
SHA256
45cdf5841c2fa78cc444a0926fd3b9e7fab51d061988c45bc894ebb09991bc5d
-
SHA512
68475d89314d4273af8c01e5c71d39230d2c3fcb2d53048ed003d44d63f8270d9f8cd0c4858fad778ea0c460adf42c3e6f4aef7b255c09b717e84ce8b5d58db9
-
SSDEEP
6144:tB27VZ3oMfRczHKW826U0l78ajUdsB+sBT:tBev4wRg7E8KUOFB
Score7/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-