General

  • Target

    f58e8ed6a359b31e1b3673154dcda56335a62068672821271b35bcc5a8b471da_JC.rar

  • Size

    395KB

  • Sample

    231003-stfkhsef74

  • MD5

    edb63ea729b3060e5252f7c952ca78e4

  • SHA1

    918fa7d1bf9dd62417387c26eaff9f5b3cd8636b

  • SHA256

    f58e8ed6a359b31e1b3673154dcda56335a62068672821271b35bcc5a8b471da

  • SHA512

    68ccef00d318c01edcfab00813c19398780cdab85588a966b61527e45794ee815ead82b3998d5ff8a9d0c39f63421588a1874835214e01f90cd43bfb5fa652f5

  • SSDEEP

    6144:QYIJ9jPVsvGEKqXK9BBEY4ot9t3kV2FxyBjUjzltTVx8IM67VQPDI+eSBbLah2kI:3IJdsmJEQ9t3jFKovH5SmHR6P4Rw

Score
6/10

Malware Config

Targets

    • Target

      Invoice.exe

    • Size

      518KB

    • MD5

      63f7fc248ad2d9cdfec16a9713d1b094

    • SHA1

      ac3cc8f9b05f263bb437ec15e3ef9ca5144eb1c8

    • SHA256

      d5252b71a90d3ef290ff4a760b8cd4ec847feac8d5737eed43728bca34b2068b

    • SHA512

      66a3c7ecfb10bca1a7e4602937844475597c03543be55a31c471a805d96d559c3bed7775424290864158b66cf03706019bf7256499d784a3f9af7173c75bb81f

    • SSDEEP

      12288:0gMXsrU1Rm5/Ba2TeA2ZnAB+wM/ZkVpEzBj/fP5QlH:MiUGTTL2ZABcGVpE1/neH

    Score
    6/10
    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks