General
-
Target
Zahlung,jpg.exe
-
Size
899KB
-
Sample
230201-hexv5scb93
-
MD5
aa72afc6fdca3aff5043694f61c54510
-
SHA1
01e334b719d0735e9fa27b227068ea6d8f07d021
-
SHA256
d9117ba98a0abf65bd92272205ee3371dab1f2ad9bbd80d21107b4259697831e
-
SHA512
065754accdd145a07f9971ac0e23dd348905eae5536b61f2be3a4313846088d45f22dee0af0fbff271e99a753d0596fcbabd2c07e65a666a03a02d9b9e2dea49
-
SSDEEP
12288:+ZflYWr87728fM/f6RSabB2RiTh3DTUYX+IJNCNJ9i7+pv7c4N34iDstW7RQxK6R:kflYWr8BMX6R5N8CzTAJw6R7c4N34V
Static task
static1
Behavioral task
behavioral1
Sample
Zahlung,jpg.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
Zahlung,jpg.exe
-
Size
899KB
-
MD5
aa72afc6fdca3aff5043694f61c54510
-
SHA1
01e334b719d0735e9fa27b227068ea6d8f07d021
-
SHA256
d9117ba98a0abf65bd92272205ee3371dab1f2ad9bbd80d21107b4259697831e
-
SHA512
065754accdd145a07f9971ac0e23dd348905eae5536b61f2be3a4313846088d45f22dee0af0fbff271e99a753d0596fcbabd2c07e65a666a03a02d9b9e2dea49
-
SSDEEP
12288:+ZflYWr87728fM/f6RSabB2RiTh3DTUYX+IJNCNJ9i7+pv7c4N34iDstW7RQxK6R:kflYWr8BMX6R5N8CzTAJw6R7c4N34V
Score7/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-