General
-
Target
364702ebab29d8422e3612ab66ff2732d1a45153a6a969a6d09b0b341d1a6366
-
Size
123KB
-
Sample
231116-ng72sacd8t
-
MD5
85df717c5f2d3f332318128b3198ea98
-
SHA1
791a90af15fda54ed7ac363a3d3c4c9eb9ae6890
-
SHA256
364702ebab29d8422e3612ab66ff2732d1a45153a6a969a6d09b0b341d1a6366
-
SHA512
a6b35ea9c863c7c7b808a3369b2a11885cbe90bbf961e7108d4e9f7c6a6308058f5bbfc30aa0cbd560e66e048ea4dd05abb88167e385117356760e6aa6f2d619
-
SSDEEP
3072:DYrkNLtOmvQEJq4wJtoyf8L+Co0WwRukhr3Y1VE2r8NCiuMh7:DY8R1vQORaHU0KRVhzTCir
Static task
static1
Behavioral task
behavioral1
Sample
Faktura_21110498774987·pdf.vbe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Faktura_21110498774987·pdf.vbe
Resource
win10-20231023-en
Behavioral task
behavioral3
Sample
Faktura_21110498774987·pdf.vbe
Resource
win10v2004-20231025-en
Malware Config
Targets
-
-
Target
Faktura_21110498774987·pdf.vbe
-
Size
251KB
-
MD5
c2d91d1d271983f5d3ddcc6229d572f1
-
SHA1
42214503d23d5f889b2ca926b9b56971fe593fc2
-
SHA256
18b75005950d9e39a1eb5ce18453e23e00ddecb2ac941967686f8a27b2db9ef9
-
SHA512
9ba3fbd35d1d2d01815be68858d3225968bc4265f15a9fcf8430fbff38c9e024feb5dc0088fcedc7be831947f98018c4ff0e9035e1aabc64bb68abccaac8c6be
-
SSDEEP
6144:jbMIJnEsivnLMFiPP1Yq4zCfB+GS7OjwM3aECUXmk:fMRngIP154+3wM3ruk
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1