General

  • Target

    lnvoice-1205700442.pdf

  • Size

    51KB

  • Sample

    240509-ncq8gaef2t

  • MD5

    00ddbd030ad7e3937c2bd2a3b9eb5bc8

  • SHA1

    8c491b21744426105813f2d70d59da67a420662e

  • SHA256

    bac254771e7542c3db185f2f91a861bc9790d82cf4e64e77568346594fc40c72

  • SHA512

    44f30df5a027b9087a34e14b848f63811f5895e099b2db163852d23ebe7265d467329dcc4e47e562b5b10c0948d4195e2ed499130b61a5595008ff32cc7de585

  • SSDEEP

    384:qpy6SDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz3QznMlMNRwH7Tx6yso:qpy6ST7hWGTO/KNznMlUwHfj

Malware Config

Targets

    • Target

      lnvoice-1205700442.pdf

    • Size

      51KB

    • MD5

      00ddbd030ad7e3937c2bd2a3b9eb5bc8

    • SHA1

      8c491b21744426105813f2d70d59da67a420662e

    • SHA256

      bac254771e7542c3db185f2f91a861bc9790d82cf4e64e77568346594fc40c72

    • SHA512

      44f30df5a027b9087a34e14b848f63811f5895e099b2db163852d23ebe7265d467329dcc4e47e562b5b10c0948d4195e2ed499130b61a5595008ff32cc7de585

    • SSDEEP

      384:qpy6SDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz3QznMlMNRwH7Tx6yso:qpy6ST7hWGTO/KNznMlUwHfj

    • Blocklisted process makes network request

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks