General
-
Target
Payment Advice.ace
-
Size
546KB
-
Sample
210507-9fn2v4pc72
-
MD5
9734315e8f21a21af680fa517d56deb0
-
SHA1
a5cfdff59d6044b9b6e84fbc1af8f416ba042c6a
-
SHA256
d8a3f997814712c60b6db89d30b8b9faf71be66a95afdb7c48685ff2124728bc
-
SHA512
adc144bf7bc1187b49dc51e869e349754369842dbab2948d2e6f19d594a145bb043f67c54c4c34be9859c28b6d6f55120a9d7195c7676ba3130c264ff65aff92
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Payment Advice.exe
Resource
win10v20210408
Malware Config
Extracted
oski
209.141.49.199
Targets
-
-
Target
Payment Advice.exe
-
Size
766KB
-
MD5
15dcf73ba7415cdddcbc2f840510cbd5
-
SHA1
01bd1af8ccb0643cf153520210e7e7dcd7ff0ae7
-
SHA256
0768e83e8d36f21ea90867dcf3935ee48795daf2e4a0017979e752b865c95d9e
-
SHA512
faaf9c36ecd8135690d3166cccccab3a92e1a341cb17d061ed4bf748b3a6724c0b09b369d9749de98e1e1f11c43a070a530a55f4fa13aef79e1b4ac2bcf72c3d
Score10/10-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-