General
-
Target
invoice.docx.exe
-
Size
2.0MB
-
Sample
230830-jmmktaae58
-
MD5
486cca7db81662acf63137de5e1ea20e
-
SHA1
2bf5cea8667a493cd94bd485c3f12e58d6912b8e
-
SHA256
b3f29a2e0aebdad74750ab849e49b7d521e12e361d4bc96aff307dece3f16036
-
SHA512
f11694c06260401db95856959d44810350fc061da6d28ebbfa0f276e0cf4f61b8314ae65d34a23126a1926b0b137d215cdeb7b9a433de50e770bb1a9f68f5111
-
SSDEEP
49152:PgWxkesOs5XWNMiP3U2b/HdVbN6ziS2PJ3dXZeuR:Imkets5XWDconN6zfQ5
Behavioral task
behavioral1
Sample
invoice.docx.exe
Resource
win7-20230712-en
Malware Config
Extracted
darkcloud
- email_from
- email_to
Targets
-
-
Target
invoice.docx.exe
-
Size
2.0MB
-
MD5
486cca7db81662acf63137de5e1ea20e
-
SHA1
2bf5cea8667a493cd94bd485c3f12e58d6912b8e
-
SHA256
b3f29a2e0aebdad74750ab849e49b7d521e12e361d4bc96aff307dece3f16036
-
SHA512
f11694c06260401db95856959d44810350fc061da6d28ebbfa0f276e0cf4f61b8314ae65d34a23126a1926b0b137d215cdeb7b9a433de50e770bb1a9f68f5111
-
SSDEEP
49152:PgWxkesOs5XWNMiP3U2b/HdVbN6ziS2PJ3dXZeuR:Imkets5XWDconN6zfQ5
-
Suspicious use of SetThreadContext
-