General
-
Target
Letter_Of_Intention.pdf.lnk
-
Size
2KB
-
Sample
230202-tt5ebahc73
-
MD5
db8b6e721301ce8d986877d2e9b821b3
-
SHA1
95babc0e92aed7668b13725c4ad04318f9178a2d
-
SHA256
808a15dbb98bcbeedf375303e8250fe10e8f90aa6f83fad083d878ced6a35366
-
SHA512
2348aff088738961863486b8cdac74beae06a27707298050dfffbeaaf2fb3b888c90b5555156b0abff2a4962f5624afa2e6d0ba9ec9f9fddae49f4965eec7227
Static task
static1
Behavioral task
behavioral1
Sample
Letter_Of_Intention.pdf.lnk
Resource
win7-20221111-en
Malware Config
Extracted
http://179.43.176.16/intention.hta
Targets
-
-
Target
Letter_Of_Intention.pdf.lnk
-
Size
2KB
-
MD5
db8b6e721301ce8d986877d2e9b821b3
-
SHA1
95babc0e92aed7668b13725c4ad04318f9178a2d
-
SHA256
808a15dbb98bcbeedf375303e8250fe10e8f90aa6f83fad083d878ced6a35366
-
SHA512
2348aff088738961863486b8cdac74beae06a27707298050dfffbeaaf2fb3b888c90b5555156b0abff2a4962f5624afa2e6d0ba9ec9f9fddae49f4965eec7227
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-