General

  • Target

    USD46k Swift_PDF.rar

  • Size

    634KB

  • Sample

    240528-h3s7vsbg97

  • MD5

    919bfcbe3286c04bf6644af853a5b079

  • SHA1

    9c64c5400d2508b3662e921d9cf79f2c7a2e0608

  • SHA256

    5c19b86ed079963f1c1de8c484d5c5b03bcb2a0bf7b28f688868c3278615d9e0

  • SHA512

    4d58c3386f103609c343dfb5b6e607202d4172da800b42dc5a3ee430b3fa7e44eb2275438741c16500a6b2697cb2db072091c3a17e2783a41d2609265d976f44

  • SSDEEP

    12288:0HeZ+m3WJ3RUIGY3U1fvveGlW13jOW6UIm4uSjJQQTQ5pzBip:wef3W5REn1fvve4ijOxUImjSj+2QvNip

Score
7/10
upx

Malware Config

Targets

    • Target

      USD46k Swift_PDF.exe

    • Size

      659KB

    • MD5

      b2c97bdc5cdba659fcc2da66d2f80a8f

    • SHA1

      812541b4d56efd804b47fdae1630b69433419320

    • SHA256

      256194e31f5e3cdd00144320e30165ec54d77de265f5d959b22993b4ce124863

    • SHA512

      013abfed445d1d1868a65a9e632759d3c600c3c334cb001f6dd527557667e1bd3e95b07d4d650c8bb83cf5ebe9f8962c9a8be0b53562c880299f0fa7776f865d

    • SSDEEP

      12288:AYV6MorX7qzuC3QHO9FQVHPF51jgc1tcpHY+etwlcjM3c0Ib9:fBXu9HGaVHotetwlcuKb9

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks