General
-
Target
INVNOVPAY30002021001199554Pay5443545632211000.exe
-
Size
1.7MB
-
Sample
211201-jxrbraaggn
-
MD5
b139dd38b0aaa785c555310ac2b1c3fd
-
SHA1
5873995badb3843e97bf6cfe87bcd283c30fb393
-
SHA256
ac0f87add6a605e555dc559282160c2ef708ca2fecc0799442c361c2f37f6828
-
SHA512
ea5d759be0547822763607133d3c43ae44fa9f5a5b55ea3ff4456b37152a5243e9911162debb6422473ef0e81c4d33bb0ca7d4c4a978d600beccfa7850c23ecf
Static task
static1
Behavioral task
behavioral1
Sample
INVNOVPAY30002021001199554Pay5443545632211000.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
INVNOVPAY30002021001199554Pay5443545632211000.exe
Resource
win10-en-20211104
Malware Config
Targets
-
-
Target
INVNOVPAY30002021001199554Pay5443545632211000.exe
-
Size
1.7MB
-
MD5
b139dd38b0aaa785c555310ac2b1c3fd
-
SHA1
5873995badb3843e97bf6cfe87bcd283c30fb393
-
SHA256
ac0f87add6a605e555dc559282160c2ef708ca2fecc0799442c361c2f37f6828
-
SHA512
ea5d759be0547822763607133d3c43ae44fa9f5a5b55ea3ff4456b37152a5243e9911162debb6422473ef0e81c4d33bb0ca7d4c4a978d600beccfa7850c23ecf
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Adds policy Run key to start application
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-