General
-
Target
Invoice.exe
-
Size
799KB
-
Sample
230829-ym4lnaae6t
-
MD5
65b7f572596c639c3fed24fec9a3ec04
-
SHA1
c9baab334e8fe8c74fd9550ac2851d4b33a8c61c
-
SHA256
8f54aa1cd28e20beb85b66bb98de7f422ac6b8a4a3994a62bbd1c55d9876df3b
-
SHA512
536f9e110ef39ac1de776e3d09cbbb95bf00ac34a9774676a18fbacaa6220e4a25f40e461bd880050ecf2cfebcbdfba98d0ae460881daba916d8f6c8a558fc4f
-
SSDEEP
12288:VwC0hPqOnwLHwqi/pZXQb+76loygtnixs0123sTL1VP30IdhWMzPtmnpAbf12:VrSSs37IoPtixs01281VP5FzPs0f1
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20230712-en
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot6028253602:AAFFbacUfiOxmvzuo36D6g83Flf23bpPXYA/sendMessage?chat_id=5954758350
Targets
-
-
Target
Invoice.exe
-
Size
799KB
-
MD5
65b7f572596c639c3fed24fec9a3ec04
-
SHA1
c9baab334e8fe8c74fd9550ac2851d4b33a8c61c
-
SHA256
8f54aa1cd28e20beb85b66bb98de7f422ac6b8a4a3994a62bbd1c55d9876df3b
-
SHA512
536f9e110ef39ac1de776e3d09cbbb95bf00ac34a9774676a18fbacaa6220e4a25f40e461bd880050ecf2cfebcbdfba98d0ae460881daba916d8f6c8a558fc4f
-
SSDEEP
12288:VwC0hPqOnwLHwqi/pZXQb+76loygtnixs0123sTL1VP30IdhWMzPtmnpAbf12:VrSSs37IoPtixs01281VP5FzPs0f1
-
Suspicious use of SetThreadContext
-