General
-
Target
Christmas Shipment 102120208586_PDF.exe
-
Size
349KB
-
Sample
201022-cxcnhy84b2
-
MD5
d83e43d9071e4db4af3cb776b5ec020c
-
SHA1
d4a4e658b5658901e62a17ae85cf15ec8051cad3
-
SHA256
3dd49a4c4138beb588bd295bdf95af66f5d4779cb1d70731a3702dd08c794d66
-
SHA512
f3aa967c4d7ad1294968b8e4e94ca51f171ecd003bb7709f9da006e4acdda8b8a40fdf3219b69afac7bbbb3cc0cd0198ce5978b75d8387b02f510bcb5e6fbf22
Static task
static1
Behavioral task
behavioral1
Sample
Christmas Shipment 102120208586_PDF.exe
Resource
win7
Malware Config
Targets
-
-
Target
Christmas Shipment 102120208586_PDF.exe
-
Size
349KB
-
MD5
d83e43d9071e4db4af3cb776b5ec020c
-
SHA1
d4a4e658b5658901e62a17ae85cf15ec8051cad3
-
SHA256
3dd49a4c4138beb588bd295bdf95af66f5d4779cb1d70731a3702dd08c794d66
-
SHA512
f3aa967c4d7ad1294968b8e4e94ca51f171ecd003bb7709f9da006e4acdda8b8a40fdf3219b69afac7bbbb3cc0cd0198ce5978b75d8387b02f510bcb5e6fbf22
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
HiveRAT Payload
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetThreadContext
-