Static task
static1
Behavioral task
behavioral1
Sample
Paid invoice #752 dsdsatsip.qld.gov.au .html
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Paid invoice #752 dsdsatsip.qld.gov.au .html
Resource
win10v2004-20230621-en
General
-
Target
FW Malicious FW Re Payment Has been sent on 692023 via sharepoint.msg
-
Size
580KB
-
MD5
f6796d5981effe5469aaf74df7942e5a
-
SHA1
119c3763640a4590a1b1fa1d417391830d4dd22f
-
SHA256
343c2b0da93c4826bbd50f1cfa68e9a453a5c008ee038af749982c8fa3c7ce78
-
SHA512
544dae3bf7c7b7b4209c209bc4a9bed1ea23c8cd36f24ab1c21f06607d87f9c995a89b976e5e577a5bf061ed29e0d769e870ee218147418e41e4da35eabddd45
-
SSDEEP
6144:OEkXwARlI09YEJxgmhHtEVDf+eAprcrV11EwYxanpabIHrCPZI0+XTf+eAprcrV:5kXzIWmVj+wKXbIHr8Id+
Malware Config
Signatures
Files
-
FW Malicious FW Re Payment Has been sent on 692023 via sharepoint.msg.msg
-
http://AUS01-SY4-obe.outbound.protection.outlook.com
-
http://SY4AUS01FT019.eop-AUS01.prod.protection.outlook.com
-
http://analyzer.securityeducation.com
-
http://communitiesqld.onmicrosoft.com
-
http://cyjma.qld.gov.au
-
http://dsdsatsip.qld.gov.au
-
https://www.covid19.qld.gov.au
-
http://mail.communities.qld.gov.au
-
http://smtp2.communities.qld.gov.au
-
http://wellnessaustraliagiilup.com.au
-
http://wellnessaustraliagroup.com.au
- Show all
-
-
Paid invoice #752 dsdsatsip.qld.gov.au .html.html .js
-
headers-29ec98ef-0d1f-4e10-ae08-4e02a9516866.txt.eml
-
image001.png.png
-
image002.png.png
-
vartaskresourcesattachments.png.png
-
vartaskresourcesproofpointlogo.png.png