General
-
Target
RFQ-IND23072113.doc
-
Size
1.5MB
-
Sample
230816-sdey2sdd8z
-
MD5
79c4c36735d3c657aebb38413b4d1983
-
SHA1
06c8bd4fc23c4d932cb9efe3ee3cf28d906e8490
-
SHA256
3a7e9e3acce7084d991834a07d48907876ac05bfff985d1aa856f218d33c3f75
-
SHA512
1e5672a23d0c7a08af79520eb3218bcd60b197f8d7acc4b4664f42b3270301223908e64f312a3becb87abe1c81412d8ccaff1708a0e346bc62742033ba5caf23
-
SSDEEP
24576:rOKXMxJ1yZTr0b0LxqvkC/99AqCo/ElrKHLaHwLZURyYf3jYVkXmeKBuG66RnAbg:Y
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-IND23072113.rtf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RFQ-IND23072113.rtf
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
RFQ-IND23072113.doc
-
Size
1.5MB
-
MD5
79c4c36735d3c657aebb38413b4d1983
-
SHA1
06c8bd4fc23c4d932cb9efe3ee3cf28d906e8490
-
SHA256
3a7e9e3acce7084d991834a07d48907876ac05bfff985d1aa856f218d33c3f75
-
SHA512
1e5672a23d0c7a08af79520eb3218bcd60b197f8d7acc4b4664f42b3270301223908e64f312a3becb87abe1c81412d8ccaff1708a0e346bc62742033ba5caf23
-
SSDEEP
24576:rOKXMxJ1yZTr0b0LxqvkC/99AqCo/ElrKHLaHwLZURyYf3jYVkXmeKBuG66RnAbg:Y
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-