General
-
Target
ListTransactionInvoice.pif
-
Size
7.1MB
-
Sample
201109-38nygm2jvj
-
MD5
45b74aacbd5a7c693f74caf83d2c1af2
-
SHA1
f10960f5ba116e419d7a334889753964cffee547
-
SHA256
b3550779f1211365321210344de50d32f4e0477c2817919474d0bf49574fcd01
-
SHA512
2372c1d7b473c9c06986d8050eef91e2f7d1b1a66d3ad098e7a37ac276604d696d9a92542209136fb5eb4df6e00c07792db392b0f5c3d115b1ff1da7c2b3a9b8
Static task
static1
Behavioral task
behavioral1
Sample
ListTransactionInvoice.pif.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
ListTransactionInvoice.pif
-
Size
7.1MB
-
MD5
45b74aacbd5a7c693f74caf83d2c1af2
-
SHA1
f10960f5ba116e419d7a334889753964cffee547
-
SHA256
b3550779f1211365321210344de50d32f4e0477c2817919474d0bf49574fcd01
-
SHA512
2372c1d7b473c9c06986d8050eef91e2f7d1b1a66d3ad098e7a37ac276604d696d9a92542209136fb5eb4df6e00c07792db392b0f5c3d115b1ff1da7c2b3a9b8
-
ParallaxRat payload
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
-
Blacklisted process makes network request
-