General
-
Target
ad622d0d7a58e25f44b8182135ede29c
-
Size
309KB
-
Sample
221004-x2hgascac8
-
MD5
ad622d0d7a58e25f44b8182135ede29c
-
SHA1
b5b558f04770c2ac94b5a2ed01dfc57eb5e8d2f3
-
SHA256
73053551cfa74f9a12c6c4a4a0a21ca5ed4ca397b13def3784ba9de1302333b8
-
SHA512
43e31683613eeb1149901c4a10855c627e5a1b45cf697f24a367344b8783c3c981b9746566eca0df4e6e3b7e8a37da729abea257e621dc7a4864a34386982765
-
SSDEEP
6144:rDNpd6gtKX/2nOV3Y3tuFlwWB1EjYwAg3tyKRxBREEYQCVpznccnFHFs:x6gtKXenOZGuFlFBiA4tywLx/UpzncYI
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase Order.pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
oski
�&C
o.oteqprojects.co.in
Targets
-
-
Target
Purchase Order.pdf.exe
-
Size
273KB
-
MD5
bb5ce7931695bdec6adf8bdc1a674a14
-
SHA1
ac678662e2dc124111cee4ff9f180b87a8b7f2c0
-
SHA256
371384518223a80ff5381a728ba1e4f846c93713bb39bc80fb2d95cdd8158241
-
SHA512
1bde736bcafc95da870d1a51022c03de359d66b65000c50a73a070256b2fc3c971f02d70a029e1e380d544cc85eb6564bba75b2f5ea78aefac42431eabeafe7a
-
SSDEEP
6144:cVP0JqJ1ped5HIf7SwKCcdo1L6BQgyZVLa0pOxWW6krZKy:u0JqJenHIfnTcdnhyZVLXOwW6ktKy
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-