General
-
Target
d12934-0202334.doc
-
Size
39KB
-
Sample
231201-jg6fqsfh74
-
MD5
eac138b49c6f90896c9af5cbc8fe38b8
-
SHA1
c44a683c787c1d9f2ed1a016d9bd5bda3275342f
-
SHA256
44e593c98acaf52aee91c09fe00fa196668351783fc8a623fc1da5325635130f
-
SHA512
a6b4ec448b8151ed5af7ede720340829cd39b3ced230fe16a5c7b3c86f67ac5cf4c8d94f7899564c884b0607f0881ce40442672965b4b2addc83b95c2f2b627a
-
SSDEEP
384:t68NWgtQziS8px8SMDVvHLZTlteZoN0j:t68N5X3y9HH
Behavioral task
behavioral1
Sample
d12934-0202334.doc
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d12934-0202334.doc
Resource
win10v2004-20231127-en
Malware Config
Targets
-
-
Target
d12934-0202334.doc
-
Size
39KB
-
MD5
eac138b49c6f90896c9af5cbc8fe38b8
-
SHA1
c44a683c787c1d9f2ed1a016d9bd5bda3275342f
-
SHA256
44e593c98acaf52aee91c09fe00fa196668351783fc8a623fc1da5325635130f
-
SHA512
a6b4ec448b8151ed5af7ede720340829cd39b3ced230fe16a5c7b3c86f67ac5cf4c8d94f7899564c884b0607f0881ce40442672965b4b2addc83b95c2f2b627a
-
SSDEEP
384:t68NWgtQziS8px8SMDVvHLZTlteZoN0j:t68N5X3y9HH
Score10/10-
Detect Poverty Stealer Payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-