General
-
Target
b754b0ba5bdde7aa3215fdabe5e11228
-
Size
309KB
-
Sample
220922-2esqzagdbr
-
MD5
b754b0ba5bdde7aa3215fdabe5e11228
-
SHA1
5fbda11dd43d411b1b347a20e592fa0865b23301
-
SHA256
cd4ba867aec3ee6ebf16d8330785a3083b2d518ee29cd8cdeec4abd9dc814797
-
SHA512
2575f7ebf452eaf113dd9aaaf42340f243de9d80d42df8f29aa4ed59a911a1b2d578b8cef1917ff6459fa991de51c43781641df1d6036cc1bd707be440fc0739
-
SSDEEP
6144:6mUVyZsHGPl1EDYsQMEdQGgCmTH2r401ibwLAHlY8O8hVGDWajn5Ytpx57kIgpDd:qcP4KXXfsnELAHlY8LhV5HFqQE
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
oski
�&C
v.oteqprojects.co.in
Targets
-
-
Target
PURCHASE ORDER.pdf.exe
-
Size
273KB
-
MD5
3304d0b6d7ce20ce511c4a90b76f3a3c
-
SHA1
88195ea442c55fcf8e735c5525498e0b63107f0c
-
SHA256
487723e00df8d7f8bfdb57614fa32001f2addc6be9576005b04f1dff53710634
-
SHA512
130d5f5adbc5bcc4f64116e851249de7271c6ac34f706afe7e2aa9be62bfa680471c17c947806324ed1ab528cec511172f46b86ab2e7134ad4f44c948b286034
-
SSDEEP
6144:EVP0JqJ1pemf6mr5GRNoQ0kk8MMXSZ7Vl9Fnog3Fpc9QI/3We:m0JqJe46fRNC3qSNf3ndrW/3We
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-