General
-
Target
Payment Confirmation.zip
-
Size
309KB
-
Sample
210223-gw8x43legj
-
MD5
b15b72b973fdd835b3c1bd6c3511e1c7
-
SHA1
ee765c7002b518ccf582f2dcbae54aebe3eb2d07
-
SHA256
e6df55cc9bd779e4b53f57c8a2291e1a15c4ffee992b535c0ed6ed14801313aa
-
SHA512
9b3b139f85137d53e354ec30e6cad6e811e41d7eb662abed0f03a7896610d51170bfa5975dfdea05d4a3085728659c9d82a4e4cb74448b541fe009968afd21ad
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
Payment Confirmation.exe
-
Size
888KB
-
MD5
800b9d7f3a47c5a18da78cb6a54f90be
-
SHA1
67c825ca6d8f430fdfc4cbca78c442600db7ccf0
-
SHA256
e6edf54375a14314aa44db9fe8cdd48368338e7ed873f25ba2a6a5ff4381d233
-
SHA512
3f36217fc2e0afd41d16ea8e35628b00bd8e094194b892e551ba2b39fffaf16e67ece937ade136fe03286fef59718a76fc83081a7cb1dd2f8a7efa811a992e87
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-