General
-
Target
Invoice.exe
-
Size
619KB
-
Sample
231012-s511lahd4y
-
MD5
9b72692e206d68443a96079389898ee5
-
SHA1
8512515d696683c9c994f9fd8878b1b3b80299d9
-
SHA256
9886fa5dd072d4bb23ea5353ac0014d36b5425f49fdb0b315a2ed54cc5fcc33d
-
SHA512
a265e32d9dc6837cc8a1497c31f5630ab634a7a192c8c361b5ce7350fbe93cfa4c8fe3f77897f34bf0f45dbd45021527a7ff2f6f2b08f5640ce371f062f067f3
-
SSDEEP
12288:KMYnQ3j67SESV1eXl8OhA90pEPsL6U6g7t6+BmTsbqK3l2FzeqCrpoYoujW/:KBwfzSTM+qK12FqreaW/
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Invoice.exe
-
Size
619KB
-
MD5
9b72692e206d68443a96079389898ee5
-
SHA1
8512515d696683c9c994f9fd8878b1b3b80299d9
-
SHA256
9886fa5dd072d4bb23ea5353ac0014d36b5425f49fdb0b315a2ed54cc5fcc33d
-
SHA512
a265e32d9dc6837cc8a1497c31f5630ab634a7a192c8c361b5ce7350fbe93cfa4c8fe3f77897f34bf0f45dbd45021527a7ff2f6f2b08f5640ce371f062f067f3
-
SSDEEP
12288:KMYnQ3j67SESV1eXl8OhA90pEPsL6U6g7t6+BmTsbqK3l2FzeqCrpoYoujW/:KBwfzSTM+qK12FqreaW/
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-