General
-
Target
InvoicePayment.lnk
-
Size
2KB
-
Sample
210115-jktl2mdl4n
-
MD5
0e2623d2481a945842960b2d96759d32
-
SHA1
86ad7f3465926187a5243aad50e25e88d8fb716e
-
SHA256
83bc020498d9001a23acf434ab33346aea54c19fd27040751e2e61c8cd793b51
-
SHA512
6503c4f1dd32a69c873020b95e36f794bfd1f2f00a14f3f73da5ff9902bce22dabff513ce47348c447cac1e88d82654951865baf4d1f767920308e68c9546c3a
Static task
static1
Behavioral task
behavioral1
Sample
InvoicePayment.lnk
Resource
win7v20201028
Malware Config
Extracted
https://www.minpic.de/k/bgmj/168l7q/
Extracted
https://www.minpic.de/k/bgmi/113snm/
Targets
-
-
Target
InvoicePayment.lnk
-
Size
2KB
-
MD5
0e2623d2481a945842960b2d96759d32
-
SHA1
86ad7f3465926187a5243aad50e25e88d8fb716e
-
SHA256
83bc020498d9001a23acf434ab33346aea54c19fd27040751e2e61c8cd793b51
-
SHA512
6503c4f1dd32a69c873020b95e36f794bfd1f2f00a14f3f73da5ff9902bce22dabff513ce47348c447cac1e88d82654951865baf4d1f767920308e68c9546c3a
Score10/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-