General
-
Target
Invoice #003982.img
-
Size
1.6MB
-
Sample
220608-v48edsdfa4
-
MD5
0a2e97e09b19de3cee8be06a4916d4bf
-
SHA1
fb379fa0d9966f7ff44f456d6f624103f47aa61e
-
SHA256
a5ee4d2e4178ed6146ebf5cae26570b007272ac755b5088d607894fdb986972b
-
SHA512
5795f8447aa144cbd4eadf83b3af4fe8bc00ecaa3018ba6a30b9da6817d63f479caa82b817bdd41c33ab1a4c9b1acb985fab49c1b2535a6b72e9aff08d87c39d
Static task
static1
Behavioral task
behavioral1
Sample
AEPFXFNV.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AEPFXFNV.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
bitrat
1.38
oka.nerdpol.ovh:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Targets
-
-
Target
AEPFXFNV.EXE
-
Size
1.0MB
-
MD5
3daa66d053bf5aa603c9db0af979d2b7
-
SHA1
5beb955aef82e5e487b50c3a7ba38ec76d93e760
-
SHA256
bda842fc1f63fc6ab60f1964cbb4f25e655b92ffa0009d4b9a91f293e9b4f228
-
SHA512
fd54c4568d7e508ce0b47ed6d71f519608b3e850bac54bba8f3f2dcdfa49fe9cc71caf366ebf089d090c399c25c8c2842fe9c6a1b7b494f1d03cf0b6bb8a91cb
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-