General

  • Target

    d12934-0202334.doc

  • Size

    39KB

  • Sample

    231201-jg6fqsfh74

  • MD5

    eac138b49c6f90896c9af5cbc8fe38b8

  • SHA1

    c44a683c787c1d9f2ed1a016d9bd5bda3275342f

  • SHA256

    44e593c98acaf52aee91c09fe00fa196668351783fc8a623fc1da5325635130f

  • SHA512

    a6b4ec448b8151ed5af7ede720340829cd39b3ced230fe16a5c7b3c86f67ac5cf4c8d94f7899564c884b0607f0881ce40442672965b4b2addc83b95c2f2b627a

  • SSDEEP

    384:t68NWgtQziS8px8SMDVvHLZTlteZoN0j:t68N5X3y9HH

Malware Config

Targets

    • Target

      d12934-0202334.doc

    • Size

      39KB

    • MD5

      eac138b49c6f90896c9af5cbc8fe38b8

    • SHA1

      c44a683c787c1d9f2ed1a016d9bd5bda3275342f

    • SHA256

      44e593c98acaf52aee91c09fe00fa196668351783fc8a623fc1da5325635130f

    • SHA512

      a6b4ec448b8151ed5af7ede720340829cd39b3ced230fe16a5c7b3c86f67ac5cf4c8d94f7899564c884b0607f0881ce40442672965b4b2addc83b95c2f2b627a

    • SSDEEP

      384:t68NWgtQziS8px8SMDVvHLZTlteZoN0j:t68N5X3y9HH

    • Detect Poverty Stealer Payload

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks