General
-
Target
Payment_Swift_image001_18.08.2023.pdf.exe
-
Size
687KB
-
Sample
230818-qbhk2sbb6v
-
MD5
3c69c2def3695bc1a6581eeea62fe8e7
-
SHA1
001b3af50a017337a86cbb7d4d999f3a267f2142
-
SHA256
84e5beb64edd5d86e524efa857995b09d5f5f2d7e5effc974e4dfb4e4d5364ed
-
SHA512
9bf39628f917cd9b23e14bd67ac4752c43f3814de07d0f5d57c3317a3b10fa82c0a7722d15a5808d005202fd9a67904f14a060bbdb2030b4d4850c41bf495dce
-
SSDEEP
12288:75mHFFDUSbEkbwcuaDOWcruep144kPCXf5Y3fD070:NmX3Ej+OWclpdBOC
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Swift_image001_18.08.2023.pdf.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Payment_Swift_image001_18.08.2023.pdf.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.asainsaatmakina.com.tr - Port:
587 - Username:
[email protected] - Password:
asa2021
Targets
-
-
Target
Payment_Swift_image001_18.08.2023.pdf.exe
-
Size
687KB
-
MD5
3c69c2def3695bc1a6581eeea62fe8e7
-
SHA1
001b3af50a017337a86cbb7d4d999f3a267f2142
-
SHA256
84e5beb64edd5d86e524efa857995b09d5f5f2d7e5effc974e4dfb4e4d5364ed
-
SHA512
9bf39628f917cd9b23e14bd67ac4752c43f3814de07d0f5d57c3317a3b10fa82c0a7722d15a5808d005202fd9a67904f14a060bbdb2030b4d4850c41bf495dce
-
SSDEEP
12288:75mHFFDUSbEkbwcuaDOWcruep144kPCXf5Y3fD070:NmX3Ej+OWclpdBOC
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-