Resubmissions

02/02/2023, 16:31

230202-t1tamaac37 8

01/02/2023, 23:34

230201-3kfh9sdc85 8

01/02/2023, 05:43

230201-gelbnsca76 8

01/02/2023, 03:57

230201-ehzx5abg48 8

01/02/2023, 03:48

230201-ecx7cabg37 8

31/01/2023, 19:56

230131-ynswjsbh7w 8

31/01/2023, 19:48

230131-yjg89aaa52 8

General

  • Target

    Documents invoice.msi

  • Size

    4.2MB

  • Sample

    230201-gelbnsca76

  • MD5

    97114551042ab1550cca8a85ca405da1

  • SHA1

    6266c37fb9945e3adf4aa09c16526537c5197ba3

  • SHA256

    ca6e3ff4fd833ea30e613c4f9e228a04780542575a4f915256fa81349730abfa

  • SHA512

    e2588055ea1170320d342f1f13f03155ad58aec7828a6e44589ba08d6e1975b21e23a0ccb0ed18051c3e393e14d34dbc1f5a2a5556eb095155d3914653021df4

  • SSDEEP

    98304:pPKnw39kiUnMUYeg8F1HWMUKFln1vEsZSKRkGDs19sirjNGj/:swNJUnMUYetUKFZROBGu5f0j

Score
8/10

Malware Config

Targets

    • Target

      Documents invoice.msi

    • Size

      4.2MB

    • MD5

      97114551042ab1550cca8a85ca405da1

    • SHA1

      6266c37fb9945e3adf4aa09c16526537c5197ba3

    • SHA256

      ca6e3ff4fd833ea30e613c4f9e228a04780542575a4f915256fa81349730abfa

    • SHA512

      e2588055ea1170320d342f1f13f03155ad58aec7828a6e44589ba08d6e1975b21e23a0ccb0ed18051c3e393e14d34dbc1f5a2a5556eb095155d3914653021df4

    • SSDEEP

      98304:pPKnw39kiUnMUYeg8F1HWMUKFln1vEsZSKRkGDs19sirjNGj/:swNJUnMUYetUKFZROBGu5f0j

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks