General
-
Target
formularioimprimibleCLE.zip
-
Size
5.2MB
-
Sample
230630-wd8g5seb76
-
MD5
f857a8578bb0bc8bd9046dc95bb1904c
-
SHA1
50bbd3825571add8a74ec9efc35516410b7e33d4
-
SHA256
9a014178ddd4a0f7ec8cb639dd27f695d8599cb224efded5cd706faec9fb1e11
-
SHA512
0c93cabc02113980d6596d81b37db6b67d9abef52fc31768cbe56ecd59166fcf5fa79f38982fb87e0cacd2573bf68ee396200ccd73e79bce06747f5cc6f0d96c
-
SSDEEP
98304:kNN1LxxercOR4pZX7Wow5C/uFi4mYHKnn0Py5/CCo+vzm0JQ8WBiELXoDMbtvAj:oLxa6l7WoMCGM4BHI0y5/CCXvK42BiE4
Static task
static1
Behavioral task
behavioral1
Sample
formularioimprimibleCLE.msi
Resource
win7-20230621-it
Behavioral task
behavioral2
Sample
formularioimprimibleCLE.msi
Resource
win10v2004-20230621-it
Malware Config
Targets
-
-
Target
formularioimprimibleCLE.msi
-
Size
6.3MB
-
MD5
043dfa1567871c033c9514b544c7fef2
-
SHA1
97c9f86276885dcecc0e8108ebe4feef0a231518
-
SHA256
55ec807f6f52f3145fc046e64bcf4fa42ed595f10214f22025c07f7c900f3e4b
-
SHA512
a86ec480977715b8969d0b11c354acb7694526615006af9e5b1946997905464f0657cca614698cebcc6d7f5b866d6cb1c2220c2385c1bbbd9284f92c9c03d72e
-
SSDEEP
196608:u29Ik7oVQ2CAmYcA13ikoGhE4qLSupNxfTC:u2SMJ25mVA1xvzuLM
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-