General
-
Target
Payment Invoice.zip
-
Size
298KB
-
Sample
210219-dzm1tashna
-
MD5
fa588171489399bed272e9ac110f863c
-
SHA1
9d1c665e5da7252754357017c651a81d7903bfd4
-
SHA256
36e80c63a48af084e483910b7a42ecac4ed48d76c53ab8a300ad410bd0adba94
-
SHA512
cf75d10f61a1a52064b0c752d10838ffe1514f498b3e5a582448254ca84fa8a351cffd751a00bc04596d73a844c5923e48b3c076e8b578d21baf90f378b614b0
Static task
static1
Behavioral task
behavioral1
Sample
JOIN.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
JOIN.exe
-
Size
848KB
-
MD5
ff65699609255332366bf5416fb38869
-
SHA1
80e9e78f4c4be3daa256ba1e37235a7f159bd25a
-
SHA256
554711ee1f28155e4b972efff5299f79a054d31eeb18a5ce64f1617982eaeeae
-
SHA512
0e5a383e6332aee7c31c0ab60ad9d9d1e427dbe28836837a994b0ebac0eb2fe0b9741accfcb386000eb5fd19ac87adcbf86744802886b410c42887a277e9c262
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-