General
-
Target
798942_Invoice_March_26_2024_56388516.zip
-
Size
102KB
-
Sample
240326-t4wvxsed32
-
MD5
bc23494af83b82543ff42fd272ba0f3c
-
SHA1
cc147be99fccd69506f214b0e7f253830c15a782
-
SHA256
308d35ce6b416b319646b5488d4b9c0da60b6a210d1ef66b68a750d838563e68
-
SHA512
c02a28218518e677f8f05f500b68035fa8d808f16394f5f7142a2930259b9b0bdfd4e8f734668a3a05c84f5ada595808b29fe9ffaaf17dd5d28bc8cbb3f4a67b
-
SSDEEP
3072:35LJZQa3+J1muMWQQBD6O8ed8jTS4oBFqJa8j/i:35l+OBQBDQ3j0FqYS/i
Static task
static1
Behavioral task
behavioral1
Sample
798942_Invoice_03_26_2024_56388516_947935.wsf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
798942_Invoice_03_26_2024_56388516_947935.wsf
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
798942_Invoice_03_26_2024_56388516_947935.wsf
-
Size
254KB
-
MD5
3f1e08242fac55d59864b48a489d2bb0
-
SHA1
a6830d43816399e03a586dea90ffd106f0559315
-
SHA256
8cf16e4568ac3d6af03473f42670769f5a136754481e0f3c1cfd8adb5a251a07
-
SHA512
3c2fa3f12ada4d0bddbe23c868fd3476ac917cca1ae9dd6b77aa1d9ff954b7ba12184310b499a49d7bd77be29bbce2df72e848807de0dbb28c94121b2fd9b80a
-
SSDEEP
6144:nvYk8tpUa8fueWk+0HszU2SCC05Z5WBl8gO8gVd6xL:v+L25HgnoZYV0
Score8/10-
Blocklisted process makes network request
-