General
-
Target
b4f3468f92b9d34f5214cf3095fa1049
-
Size
586KB
-
Sample
240305-r3e5nshb61
-
MD5
b4f3468f92b9d34f5214cf3095fa1049
-
SHA1
5d93698c086f958efa8066c53c2a403246c6d444
-
SHA256
14803d738ab40c019f8976c4ae4185bea07a0714c9b3108401aea688341955d6
-
SHA512
0a885bbe5e3b31d95c3ff174a02ff65486bc40e9d4465aea4db109e0da0b4fab7a06a53abf257abba5858f851e62bbe5c9ae1e6b17a6d26422cd75682a514827
-
SSDEEP
12288:TBaDBRbn4Xw5I0nVMn2mqHeIHf4dR4e4kUD3eUG00DUJcR3rBED90ZRO8sF:UDB94XQVesDyRD4kUD3eUG00DUJcNrid
Static task
static1
Behavioral task
behavioral1
Sample
b4f3468f92b9d34f5214cf3095fa1049.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f3468f92b9d34f5214cf3095fa1049.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b4f3468f92b9d34f5214cf3095fa1049
-
Size
586KB
-
MD5
b4f3468f92b9d34f5214cf3095fa1049
-
SHA1
5d93698c086f958efa8066c53c2a403246c6d444
-
SHA256
14803d738ab40c019f8976c4ae4185bea07a0714c9b3108401aea688341955d6
-
SHA512
0a885bbe5e3b31d95c3ff174a02ff65486bc40e9d4465aea4db109e0da0b4fab7a06a53abf257abba5858f851e62bbe5c9ae1e6b17a6d26422cd75682a514827
-
SSDEEP
12288:TBaDBRbn4Xw5I0nVMn2mqHeIHf4dR4e4kUD3eUG00DUJcR3rBED90ZRO8sF:UDB94XQVesDyRD4kUD3eUG00DUJcNrid
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-