General

  • Target

    2023.rar

  • Size

    20.4MB

  • Sample

    231213-ert38sgaaj

  • MD5

    2575dfc6c81534e5e11421df2a89c141

  • SHA1

    b1eb85ec88efeaeb02d1ae1ab32c87c35bfc6c1e

  • SHA256

    4ae0155fe8c944ccbde62c60a52df1f2a4c56a794076d4dd679c30001a083027

  • SHA512

    402cfb08a00226dfb2c45a3e3167107731f24ef312becea838f8d4c2b25a36a91925fb911c475acc48da279b72e8c345979e6e8d59a596c5e4d6e9318339941b

  • SSDEEP

    393216:oQz3ZB5I6SO7zPVk/1V4xHQpitw7YRryl1hHyIPUBnv3LMX3n0rx+HJO69q:Z35I6SO7bVkMQpUwIryl1h1PUlv3wnjA

Score
10/10

Malware Config

Targets

    • Target

      RElectron/Electron.exe

    • Size

      254.0MB

    • MD5

      43605dbe1819b6fd2e180f942da4829b

    • SHA1

      44e91c9a1fdf38cc018e095c2090ae597cba355f

    • SHA256

      e7d3bae9998776694d9511f9b5386c51702563209527938272de87748598c8f5

    • SHA512

      3b87e6f1f13c407d512d32a944235a78ada2dee28c77c1e79991b62d1edfd4e4dfe2fbafcedc66e9d93dd138213a7a0bb00c520c02648dff7f25c0f1dd81e793

    • SSDEEP

      196608:cKLuUSG6zb68WBuF4pcEUIq1qWBNoS4hipHZkdTZ4EAAy5YpS:IJie4pcfFKi5adTZoAyk

    Score
    7/10
    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • Target

      RElectron/Method 2/loader.exe

    • Size

      207KB

    • MD5

      f2050174398836cfb7893fbf6f175ea0

    • SHA1

      cecc845f830643b597edb33a114fc24ceff83448

    • SHA256

      d492ed6acb7ea997d74cd8628f7ea68258e299f47d9e81f331055da08617bb29

    • SHA512

      ad3f57b51a4b378e8685e5150cb3ff1b26d004131c788e4f914059daabaf87c0076d47c54a00fc06ba87c6766bfa35f06ca2f86e4c711e0f89d427850a04835b

    • SSDEEP

      3072:pAPT9JyoBZMl7Urfm9pMySretPr67ybnThJhOzQHOAg0Fuj/8svRihLIBblB7UxV:povBOMOMySrQbnTh0AOLvZmIBRB7UxV

    Score
    10/10
    • Detect Poverty Stealer Payload

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks