General
-
Target
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9
-
Size
6.5MB
-
Sample
240615-bxrcravakc
-
MD5
5e5d0725fae73f2339ac8ad604fd8a48
-
SHA1
0dd3dba62970aab2c59a2269a5e478a6e30cd6f0
-
SHA256
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9
-
SHA512
c583fc74c12eb9cd54596ca47b10bf1c4b3a491d7d2f076e60e685299d1fa25b63f58d8b664ebad0bdc151cf921bff79b758ea7e974aab455198fea6c3256158
-
SSDEEP
196608:mzUZ+x1t1GshUqgqehvBypSKs3c2SvO+L0mn:VZ+x1t1GshUVlByUKs3cVvOu0mn
Static task
static1
Behavioral task
behavioral1
Sample
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9.dll
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9
-
Size
6.5MB
-
MD5
5e5d0725fae73f2339ac8ad604fd8a48
-
SHA1
0dd3dba62970aab2c59a2269a5e478a6e30cd6f0
-
SHA256
bd050828420e41a62606fad3a85f692406e1e06171c57014f4ee4533391ab4c9
-
SHA512
c583fc74c12eb9cd54596ca47b10bf1c4b3a491d7d2f076e60e685299d1fa25b63f58d8b664ebad0bdc151cf921bff79b758ea7e974aab455198fea6c3256158
-
SSDEEP
196608:mzUZ+x1t1GshUqgqehvBypSKs3c2SvO+L0mn:VZ+x1t1GshUVlByUKs3cVvOu0mn
Score8/10-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-