General
-
Target
164e898bee6dd90047df878226e298bcef8f9657c9e345d0ec22c00074866272
-
Size
492KB
-
Sample
220521-by7fcsfgfl
-
MD5
8f80da322fee60f5f6176ef25ed5e1ce
-
SHA1
432f14ceae907fe120f8b81b54fe0e3114bcfff9
-
SHA256
164e898bee6dd90047df878226e298bcef8f9657c9e345d0ec22c00074866272
-
SHA512
5570c1ef464a3006ad1df8e28f3fe95e60b2f0e4375c9bb34a9c24a349e20164dc3233dab33c4f80588e17a7a2e8c7b55b40e4ea403d695dc9f4feb00a595197
Static task
static1
Behavioral task
behavioral1
Sample
Receipt For Shipment - 202008DHL_pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Receipt For Shipment - 202008DHL_pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Receipt For Shipment - 202008DHL_pdf.exe
-
Size
439KB
-
MD5
ddb7bbd558fcd125902849965c808037
-
SHA1
1709dd13064045c763fef647324ea18f6548a93e
-
SHA256
01a1c9bf023cdb265ad67a2a45db38fe25e9a23fd4bdb75a9e8f12c7b79eec8f
-
SHA512
480450fc131ac2a97be46d22f47022dc23b9aff807825be4e333f5638f0a86c20a24f86af9e72f06af4d33456316b862191c164fcb01920c3c97b0577dbf757e
Score10/10-
HiveRAT Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-