General
-
Target
5a219789ff691b312aaaf2321c69f22b08f1483c39fda6602bfb4f4b5db60808
-
Size
458KB
-
Sample
220521-n2w51seeb8
-
MD5
1484d3d6839156ed16de53bd1e74e090
-
SHA1
e04ceac0b3059403d53bd31f192b4e2303b72210
-
SHA256
5a219789ff691b312aaaf2321c69f22b08f1483c39fda6602bfb4f4b5db60808
-
SHA512
caa35a4446e8e45ac0b7134f2a5f21e35148a372f5e973a6a5232d370330eeb0a4c1803f946756647aebedd1037350a6e23adf9f40b68e5edfb47756a14ef7ff
Static task
static1
Behavioral task
behavioral1
Sample
SOR Price 062820KATARA PROJECT - MECH SOR (Tender).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOR Price 062820KATARA PROJECT - MECH SOR (Tender).exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
SOR Price 062820KATARA PROJECT - MECH SOR (Tender).exe
-
Size
832KB
-
MD5
2e018760f30cafe649036f80a058339a
-
SHA1
d4d9986aa867390a66346d9f5e879f6f407b974d
-
SHA256
8415b396574342f35cc4e90b8a2d1cb7632cb1d762142088cd71fce4473fc0f0
-
SHA512
d041d40f221c99254027f57dbb16b5ba43dfe196231de5fc7d4218029678c086a8f3aac9493fc1d33c4ad49182925eb3db5a96f81366624f892e19868780078c
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-