General
-
Target
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N
-
Size
36KB
-
Sample
241015-dvnvyswdkl
-
MD5
2c29381e338cdb2292bd31b60c28f4e0
-
SHA1
d2fbc71b0fb593f9d5489ea90d7916a7e22fa789
-
SHA256
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38
-
SHA512
ade9d38e6ab74f8baa9f7e12f333b5d2315e2f92b18be5e404a9b33075c488038535cc917d9025b91999138d691da66266b0710ba20c084c5680434230fab229
-
SSDEEP
768:xdf5Jutj/1EUUQbb0xEFxVd42OWSCyidt9n7Lg/+aJMNUzNNlU:xdOtpV4qdRO5riZqusW
Static task
static1
Behavioral task
behavioral1
Sample
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38N
-
Size
36KB
-
MD5
2c29381e338cdb2292bd31b60c28f4e0
-
SHA1
d2fbc71b0fb593f9d5489ea90d7916a7e22fa789
-
SHA256
ceb7312367e44335e44861552ac04994b2dcbebf4d166f64209ae14da02d2e38
-
SHA512
ade9d38e6ab74f8baa9f7e12f333b5d2315e2f92b18be5e404a9b33075c488038535cc917d9025b91999138d691da66266b0710ba20c084c5680434230fab229
-
SSDEEP
768:xdf5Jutj/1EUUQbb0xEFxVd42OWSCyidt9n7Lg/+aJMNUzNNlU:xdOtpV4qdRO5riZqusW
Score6/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-