Behavioral task
behavioral1
Sample
04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf
Resource
win10v2004-20240426-en
General
-
Target
04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf
-
Size
44KB
-
MD5
7fbc542837eff971d74c83b02eb994bc
-
SHA1
617a3319f2c15edc4ab80df44348bdcb12ec1ad3
-
SHA256
2dcc8bbf0f1e1f7c30ed947cfdaf59d106877fec6dd4db093b568ae16c27a954
-
SHA512
d7a59effd1271bd97cc40c18ae28d7693585438979730c5e2503bef7033499fdf8b45940e9e812239d10151ad2eb30b067fdb57acdc3ca7f96b4b7da03037364
-
SSDEEP
768:ezEFBr6xyOXBnHH4KRxACalgFmS/8V2DNmftt+zVym33bIQNToFMI:Nr6xyiBnHYTlWmS/8uGMVyesS0FV
Malware Config
Signatures
Files
-
04415aa9-e113-467f-95ee-b56a2a18c1f9_240426_pwrd_Bericht_Phishing-Attacke.pdf.pdf
-
https://www.microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/
-
https://www.mitiga.io/blog/persistent-mfa-circumvention-in-an-advanced-bec-campaign-on-micro-soft-365-targets
-
https://www.mitiga.io/blog/persistent-mfa-circumvention-in-an-advanced-bec-campaign-on-microsoft-365-targets
-