General

  • Target

    10ZK42zz.exe

  • Size

    895KB

  • Sample

    231113-lksp6acc77

  • MD5

    d6022564257f219af36a3f9eb08bf087

  • SHA1

    63569cdf2de19ff4aa376a691e865bb7a251b456

  • SHA256

    c0ef3a77375113ff1e467111311dc50d9492ee0b1a69060ada68800a765530ea

  • SHA512

    0fcd8984811475e7b34e57bd8768921d1ea355e9dd3e8d03b4700546b254c96c5b1ffae829e81bf88acfe4cd38b409487d78cf51f9b620058df914bf92e49d70

  • SSDEEP

    12288:jqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaOT2:jqDEvCTbMWu7rQYlBQcBiT6rprG8a22

Score
10/10

Malware Config

Targets

    • Target

      10ZK42zz.exe

    • Size

      895KB

    • MD5

      d6022564257f219af36a3f9eb08bf087

    • SHA1

      63569cdf2de19ff4aa376a691e865bb7a251b456

    • SHA256

      c0ef3a77375113ff1e467111311dc50d9492ee0b1a69060ada68800a765530ea

    • SHA512

      0fcd8984811475e7b34e57bd8768921d1ea355e9dd3e8d03b4700546b254c96c5b1ffae829e81bf88acfe4cd38b409487d78cf51f9b620058df914bf92e49d70

    • SSDEEP

      12288:jqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaOT2:jqDEvCTbMWu7rQYlBQcBiT6rprG8a22

    Score
    10/10
    • Detected google phishing page

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Detected potential entity reuse from brand paypal.

MITRE ATT&CK Enterprise v15

Tasks