General
-
Target
id-F.63c47b8a03bb2.zip
-
Size
5.9MB
-
Sample
230115-17w4esha3s
-
MD5
88ae5410b710eb54ffce883392f073f1
-
SHA1
bf2a48f72da7b386515deee3b27e414b64c22473
-
SHA256
b55c4aec48d0564b8f003d74531e627273219c73c274d239ede65e79a3df943a
-
SHA512
4509ab787a0cc2007fccb2b4c60fbfe25e9eb1da07df0edddcee88aea921f26802a46fe83e38092541e48dfa1842a85e935bde1ad3cca5e7e1ab6f9e66b30923
-
SSDEEP
98304:TRrR6EMiC8AcA1Gk42FSORzuOgsl8WSob6S/8buJVkD8JMfjWWnfSWvn8KLNARH9:1rcxn8ecOR+slJSu/8buTkD0q1nfPkWy
Static task
static1
Behavioral task
behavioral1
Sample
Factura63c47.msi
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
Factura63c47.msi
Resource
win7-20221111-es
Behavioral task
behavioral3
Sample
Factura63c47.msi
Resource
win10v2004-20221111-es
Malware Config
Targets
-
-
Target
Factura63c47.msi
-
Size
6.6MB
-
MD5
2187f88f99a58bbe6d8d76447ddec93e
-
SHA1
86b0b6e867b97f68b666fd2d93b42b8308d7426e
-
SHA256
7aed2f04618c60642965a3544d5927aa58b4092c1cce70c3a9ed55f161bb4a0a
-
SHA512
bc7bfad3a1f2e86a4e56adb2caf78f2123dd256cfcb37f6143ab0ff090b5391cbb5df3515dba1bfb53bce61bc6044b0c64681c3657781eff670bdf6f9b712a53
-
SSDEEP
98304:NYEtM2Af5tdoOS8mcA18WgQLKk9jEOy0pqQdA43Ak+jVktqMh8+pBwThNVCjHRrG:9M5tyr8mak9c0p243MlQwTLVCxZw
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-