General
-
Target
Invoice.rar
-
Size
600KB
-
Sample
231009-rpkg8sdd2s
-
MD5
46b58fc6ea35cdd3a7b3fbaa20389030
-
SHA1
3b8403ebaa9b78107d5bfcad29df4adefeeb8c1c
-
SHA256
545482debc771e46e3444734ac23e2c368cca21a2b8b0b081b05c24b6f8e4ca2
-
SHA512
f06954d0c7db4b95d5b30ce6e026109c7722b2ab62a69bd051345c1f99d070e097f0e8cff86d59d827faeb60690edddc5a3ef7f3c363cbf53278164ea22647b0
-
SSDEEP
12288:jYoUgVNYURmzgThQNfQiozyFekaTXaPSYpffKCb:coT60TKBogPSYpF
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20230831-en
Malware Config
Extracted
Protocol: smtp- Host:
premium184.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
^HPUm$4%eL~b
Targets
-
-
Target
Invoice.exe
-
Size
644KB
-
MD5
378a8353e948f85fc2c580294b65b56e
-
SHA1
446b17e72f61fc51ac27f9d31f7e649239116fe8
-
SHA256
b8cc87b3e18517799b9d256edc93224ff87b14756d37b8c6c2d9a89eb3f9b533
-
SHA512
d62162bcb09da9514e985866d9ff8ffdda1f09d29b4b7e107a780f5003166213e74000defa63869fe452563de7a366763595e832932cbb9f1e6bb3ddcc805cce
-
SSDEEP
12288:xG7s9CfBQhxVbhcUgrNjsjgtRm7FiNQpPJabwupO8TSqH:Y7s9lVbpgrNLmISxJ103TSq
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-