General
-
Target
f58e8ed6a359b31e1b3673154dcda56335a62068672821271b35bcc5a8b471da_JC.rar
-
Size
395KB
-
Sample
231003-stfkhsef74
-
MD5
edb63ea729b3060e5252f7c952ca78e4
-
SHA1
918fa7d1bf9dd62417387c26eaff9f5b3cd8636b
-
SHA256
f58e8ed6a359b31e1b3673154dcda56335a62068672821271b35bcc5a8b471da
-
SHA512
68ccef00d318c01edcfab00813c19398780cdab85588a966b61527e45794ee815ead82b3998d5ff8a9d0c39f63421588a1874835214e01f90cd43bfb5fa652f5
-
SSDEEP
6144:QYIJ9jPVsvGEKqXK9BBEY4ot9t3kV2FxyBjUjzltTVx8IM67VQPDI+eSBbLah2kI:3IJdsmJEQ9t3jFKovH5SmHR6P4Rw
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Invoice.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
Invoice.exe
-
Size
518KB
-
MD5
63f7fc248ad2d9cdfec16a9713d1b094
-
SHA1
ac3cc8f9b05f263bb437ec15e3ef9ca5144eb1c8
-
SHA256
d5252b71a90d3ef290ff4a760b8cd4ec847feac8d5737eed43728bca34b2068b
-
SHA512
66a3c7ecfb10bca1a7e4602937844475597c03543be55a31c471a805d96d559c3bed7775424290864158b66cf03706019bf7256499d784a3f9af7173c75bb81f
-
SSDEEP
12288:0gMXsrU1Rm5/Ba2TeA2ZnAB+wM/ZkVpEzBj/fP5QlH:MiUGTTL2ZABcGVpE1/neH
Score6/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-