General
-
Target
Bank Details.docx
-
Size
56KB
-
Sample
210915-ndntqsaeg5
-
MD5
349a235b69a118026fe6345f6163a035
-
SHA1
74d5c34c8ba87681251e5d0fb30e8b1f0a666c5c
-
SHA256
db0117eb9a670cfefdb35805f88c7a5e26e5a9f05d6d7592096756f589c717e5
-
SHA512
0fb015d12f0207e43762532bb9db828dbf794b84163713d59bdc7b0a556c2b367c52d028d5aae60269f6b426092dcff32796fc486c26cbb05e35ce0dde8ee966
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details.docx
Resource
win7-en
Behavioral task
behavioral2
Sample
Bank Details.docx
Resource
win10-en
Malware Config
Targets
-
-
Target
Bank Details.docx
-
Size
56KB
-
MD5
349a235b69a118026fe6345f6163a035
-
SHA1
74d5c34c8ba87681251e5d0fb30e8b1f0a666c5c
-
SHA256
db0117eb9a670cfefdb35805f88c7a5e26e5a9f05d6d7592096756f589c717e5
-
SHA512
0fb015d12f0207e43762532bb9db828dbf794b84163713d59bdc7b0a556c2b367c52d028d5aae60269f6b426092dcff32796fc486c26cbb05e35ce0dde8ee966
Score10/10-
Registers COM server for autorun
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets file execution options in registry
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-