General
-
Target
35b6746d1aacaf96889be39a5ed765e1e6cceb5ac8f38b31ebea625653cf79a1
-
Size
118KB
-
Sample
221125-wgxj2sdc69
-
MD5
ac4e7410bb26d9dfbba2e6228bdc53df
-
SHA1
0692c18a7b59b7b8e36e2c5619b128b5dba063be
-
SHA256
35b6746d1aacaf96889be39a5ed765e1e6cceb5ac8f38b31ebea625653cf79a1
-
SHA512
3b7c848a3cac4f84da8f206ef3ef2e5196e4ad40ce30c775f3ce51b7a98f70afcca67fe983524b986b02a16acf5a94aae57b310fe2dc534c4e42bfe761a5e7d0
-
SSDEEP
3072:7NWe/2fcgy+4cfWonVygq2xW+lQDuZz4AYOr8Tb7Yl://R+4wRY+lBF4AYOr8Tbcl
Static task
static1
Behavioral task
behavioral1
Sample
2014_11vodafone_onlinerechnung_0020003909_november_3903980009_11_00000000445.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2014_11vodafone_onlinerechnung_0020003909_november_3903980009_11_00000000445.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
2014_11vodafone_onlinerechnung_0020003909_november_3903980009_11_00000000445.exe
-
Size
148KB
-
MD5
6d114c7a21aab94456d8e8d4aef88362
-
SHA1
1229f292c46ffa1bde2db69227c4e98c2e46ae3a
-
SHA256
0b577f76b08c5267eb5f2f8596127a28a6eaf5ff2089cff6be0b689f31850124
-
SHA512
828b656d5eeb4e225af9bc76fad68fd51f5bc6a867450f200e005782231cfd762ceef3d2341aa9e2dcfca9db656637dda71ee6b93083664a36e15f02a0342e03
-
SSDEEP
3072:5fSj3q4+o/mYSpVygq2xW+rQDuZz4AYOr8Hkv:xSusZSXRY+rBF4AYOr8
Score7/10-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-