General
-
Target
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
Size
46KB
-
Sample
231117-lqhr5shf9v
-
MD5
22ec6c0a1b5690a63c28f20b552ba7c6
-
SHA1
c5554c56d4d45978c192b292f08b28171f949393
-
SHA256
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
SHA512
2a52de8efef7eeade654c22fab186ed410ae9f7782c0fe94f268eff5851a897bb3bce8a8c376a8d020ef2837fbaed10c98c32b4d3ba9bb25fbb184cd71f6e6ee
-
SSDEEP
384:FAu0FtlGJiS8px8SMDYCX/chqTKnhtVgUNai92ufcM7QeWN0jl:Cu0Lp3yRTUNaiYNMW
Behavioral task
behavioral1
Sample
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730.doc
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730.doc
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
Size
46KB
-
MD5
22ec6c0a1b5690a63c28f20b552ba7c6
-
SHA1
c5554c56d4d45978c192b292f08b28171f949393
-
SHA256
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
SHA512
2a52de8efef7eeade654c22fab186ed410ae9f7782c0fe94f268eff5851a897bb3bce8a8c376a8d020ef2837fbaed10c98c32b4d3ba9bb25fbb184cd71f6e6ee
-
SSDEEP
384:FAu0FtlGJiS8px8SMDYCX/chqTKnhtVgUNai92ufcM7QeWN0jl:Cu0Lp3yRTUNaiYNMW
Score10/10-
Detect Poverty Stealer Payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-