General
-
Target
a3bbe52ccb05d1f15232544e060ddd0e
-
Size
28KB
-
Sample
240225-n8js9sbh5v
-
MD5
a3bbe52ccb05d1f15232544e060ddd0e
-
SHA1
5018b4fa09fda65a2ed07b8c608c217fdd2b2eeb
-
SHA256
21e687374092e8442ccf120dee647b6db08cc27cda05b833aaee9c13b38f9f98
-
SHA512
d480584b71c653e7a651e831cbef085c55219325961a9b2486f1e91a18dd106ae5e01cf41fa76fdce221db83adc79678dab2850ef6cb2bd5bffa1b97e9b630ed
-
SSDEEP
384:tQApLnxM9Ytx5CS8x7XYLPmn0/eyARl0+Y4Pl:9UY1CPSen0fcLY4
Static task
static1
Behavioral task
behavioral1
Sample
a3bbe52ccb05d1f15232544e060ddd0e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3bbe52ccb05d1f15232544e060ddd0e.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
a3bbe52ccb05d1f15232544e060ddd0e
-
Size
28KB
-
MD5
a3bbe52ccb05d1f15232544e060ddd0e
-
SHA1
5018b4fa09fda65a2ed07b8c608c217fdd2b2eeb
-
SHA256
21e687374092e8442ccf120dee647b6db08cc27cda05b833aaee9c13b38f9f98
-
SHA512
d480584b71c653e7a651e831cbef085c55219325961a9b2486f1e91a18dd106ae5e01cf41fa76fdce221db83adc79678dab2850ef6cb2bd5bffa1b97e9b630ed
-
SSDEEP
384:tQApLnxM9Ytx5CS8x7XYLPmn0/eyARl0+Y4Pl:9UY1CPSen0fcLY4
Score8/10-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-