General
-
Target
SARS_REFUND_STATUS.pdf.lnk
-
Size
2KB
-
Sample
230126-3q514sfh24
-
MD5
cede936f03c958032135eaaee5644b8d
-
SHA1
e74704f4879a40d109b7d9113a4211fc62fa0daf
-
SHA256
4c4233e5b018a60d44067d4c5f40e18a06b544b35bbe2be95587b80bf2bf31f4
-
SHA512
9c6a094e0ccfc8aa903423bf6578327b3aacdb9c6f1a1ff5a6332656caf982cd717defe6449a0360297865af1b92d37f7c1040fdd63248d81632eaa217acec95
Static task
static1
Behavioral task
behavioral1
Sample
SARS_REFUND_STATUS.pdf.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SARS_REFUND_STATUS.pdf.lnk
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SARS_REFUND_STATUS.pdf.lnk
-
Size
2KB
-
MD5
cede936f03c958032135eaaee5644b8d
-
SHA1
e74704f4879a40d109b7d9113a4211fc62fa0daf
-
SHA256
4c4233e5b018a60d44067d4c5f40e18a06b544b35bbe2be95587b80bf2bf31f4
-
SHA512
9c6a094e0ccfc8aa903423bf6578327b3aacdb9c6f1a1ff5a6332656caf982cd717defe6449a0360297865af1b92d37f7c1040fdd63248d81632eaa217acec95
Score10/10-
Blocklisted process makes network request
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-