General
-
Target
lnvoice-1205700442.pdf
-
Size
51KB
-
Sample
240509-ncq8gaef2t
-
MD5
00ddbd030ad7e3937c2bd2a3b9eb5bc8
-
SHA1
8c491b21744426105813f2d70d59da67a420662e
-
SHA256
bac254771e7542c3db185f2f91a861bc9790d82cf4e64e77568346594fc40c72
-
SHA512
44f30df5a027b9087a34e14b848f63811f5895e099b2db163852d23ebe7265d467329dcc4e47e562b5b10c0948d4195e2ed499130b61a5595008ff32cc7de585
-
SSDEEP
384:qpy6SDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz3QznMlMNRwH7Tx6yso:qpy6ST7hWGTO/KNznMlUwHfj
Behavioral task
behavioral1
Sample
lnvoice-1205700442.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
lnvoice-1205700442.pdf
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
lnvoice-1205700442.pdf
-
Size
51KB
-
MD5
00ddbd030ad7e3937c2bd2a3b9eb5bc8
-
SHA1
8c491b21744426105813f2d70d59da67a420662e
-
SHA256
bac254771e7542c3db185f2f91a861bc9790d82cf4e64e77568346594fc40c72
-
SHA512
44f30df5a027b9087a34e14b848f63811f5895e099b2db163852d23ebe7265d467329dcc4e47e562b5b10c0948d4195e2ed499130b61a5595008ff32cc7de585
-
SSDEEP
384:qpy6SDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz3QznMlMNRwH7Tx6yso:qpy6ST7hWGTO/KNznMlUwHfj
Score8/10-
Blocklisted process makes network request
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-