General
-
Target
bde5e56ab3f2141a74c96717e2ae4226
-
Size
303KB
-
Sample
240310-g66fxsef8s
-
MD5
bde5e56ab3f2141a74c96717e2ae4226
-
SHA1
2ec689bd3ed2fcb6c93310d9e33656dfdb40c331
-
SHA256
fa976b20962d0f995c855503cc139655018d96cbeaa5d124947589e47cafc914
-
SHA512
767475ff90bcd65a58a01a7a2ae1a2697ef18785828e405e54c6ac1643aeb409f423369727996f83a479a2251370eacee1bead4b652b672ae5a9d7d803726bc4
-
SSDEEP
6144:khXarDXe1PdmQQwS1FWakjV5KRIZRyqCfc0bzgymO:kJ4re1PdmiS1FWpraIZR7Fa/
Static task
static1
Behavioral task
behavioral1
Sample
bde5e56ab3f2141a74c96717e2ae4226.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bde5e56ab3f2141a74c96717e2ae4226.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
bde5e56ab3f2141a74c96717e2ae4226
-
Size
303KB
-
MD5
bde5e56ab3f2141a74c96717e2ae4226
-
SHA1
2ec689bd3ed2fcb6c93310d9e33656dfdb40c331
-
SHA256
fa976b20962d0f995c855503cc139655018d96cbeaa5d124947589e47cafc914
-
SHA512
767475ff90bcd65a58a01a7a2ae1a2697ef18785828e405e54c6ac1643aeb409f423369727996f83a479a2251370eacee1bead4b652b672ae5a9d7d803726bc4
-
SSDEEP
6144:khXarDXe1PdmQQwS1FWakjV5KRIZRyqCfc0bzgymO:kJ4re1PdmiS1FWpraIZR7Fa/
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-