General
-
Target
remittance020823.docx
-
Size
11KB
-
Sample
230802-g81nfsec4w
-
MD5
fe809b4f9027a85b91f32935c8462a6d
-
SHA1
0332116a7bd923f67696b8e0cd9d4ac1e8ecd0aa
-
SHA256
3cfdf7ba4102e356819a52f06dfc23138def7b10b8338d6ac7e6ada986621b53
-
SHA512
f1df5c5fd576a05950d8b8707e1e5bc622d23a6deff50479a26a2b524632d9a3f64a2372148c6718ddd0632af8883d7f5ff93023c5e519c9b168d279c91f28a1
-
SSDEEP
192:oya0NksVeWG4N5eNA2A+EnVs+mg1SoBRWJYgO36PvJKAXtY9pcWecGWL7P:oyXksVeWGu5+A2bkBdB4JYgOqP9X+9pj
Static task
static1
Behavioral task
behavioral1
Sample
remittance020823.docx
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
remittance020823.docx
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
remittance020823.docx
-
Size
11KB
-
MD5
fe809b4f9027a85b91f32935c8462a6d
-
SHA1
0332116a7bd923f67696b8e0cd9d4ac1e8ecd0aa
-
SHA256
3cfdf7ba4102e356819a52f06dfc23138def7b10b8338d6ac7e6ada986621b53
-
SHA512
f1df5c5fd576a05950d8b8707e1e5bc622d23a6deff50479a26a2b524632d9a3f64a2372148c6718ddd0632af8883d7f5ff93023c5e519c9b168d279c91f28a1
-
SSDEEP
192:oya0NksVeWG4N5eNA2A+EnVs+mg1SoBRWJYgO36PvJKAXtY9pcWecGWL7P:oyXksVeWGu5+A2bkBdB4JYgOqP9X+9pj
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-