General
-
Target
Revised invoice.rar
-
Size
607KB
-
Sample
231004-h47fwabg78
-
MD5
8ad71cc8ed5f03dbed1e37f88c83ce82
-
SHA1
647db719766240fabdd00a1594994d59821cda0b
-
SHA256
4d1891e2a9f5cfe1051d05bdab25137017ac07f3769c25e44f1078a9e92bbe79
-
SHA512
380bb6d07fd620fba0a4de70f3485fb7790b9564651f81dfe625f0c86c3a7b12c8c8fd6a26b266480655302194b7bc2f9c3234acc0afcff279edfa9dfbe8f6fe
-
SSDEEP
12288:iP/C2ARqvU9zWR/aVULMsG6b8GZjEz4xSiKSP5mwbUXsWl:iPaVRqvdNaVZs1pjEz4xiygiol
Static task
static1
Behavioral task
behavioral1
Sample
xgOsdqKwd2CPlvC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
xgOsdqKwd2CPlvC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
xgOsdqKwd2CPlvC.exe
-
Size
647KB
-
MD5
77228713b1ae12efaddd001535782c1d
-
SHA1
a8270c88399a47d739289190f1a06da12d55afbc
-
SHA256
8a6c6cf2621bc864fe773ead086f95b0d95a6d959f0920b59c571242ef5aa126
-
SHA512
b1ce8a004fc08c09715ac6459556f2d8d6cbeee9c34d1efd9584ccdba982349b868676f238a655224eb9705e467d1abff008b84c9095469b96dea2a211b20a29
-
SSDEEP
12288:AJysnoROJFmRp7OCy+RFS5p/IoGB5EErDIrQz+CUB8QvpKU8b6ZsZKpn6s+jfOF5:IoqMRp7OCZ2DGB5EErh2vp+OZsns+i
Score7/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-