General
-
Target
ORDER--GO289533005XXXX024.exe
-
Size
1.2MB
-
Sample
240723-lv3m4szgrm
-
MD5
1441d5f7792d1b6ec6b1afbd4b279f3a
-
SHA1
e3ff00dd811c11e66ce00be772b7e44d8c1bfcac
-
SHA256
d75d64f7bef53f67f4be5153a21ecc0cdf808ddbf11421f81e137adefad22257
-
SHA512
509065c1292bbf41b06a0c20923c83765814d3d044a8ec6715bbfe855e35ac30a5be884cc7c090067122722852e7db2d9665f3ee09a7afe111312dff3586402e
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHaFHumBqo+ichfvo5:Yh+ZkldoPK8YaFH/IlZhf2
Static task
static1
Behavioral task
behavioral1
Sample
ORDER--GO289533005XXXX024.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORDER--GO289533005XXXX024.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
ORDER--GO289533005XXXX024.exe
-
Size
1.2MB
-
MD5
1441d5f7792d1b6ec6b1afbd4b279f3a
-
SHA1
e3ff00dd811c11e66ce00be772b7e44d8c1bfcac
-
SHA256
d75d64f7bef53f67f4be5153a21ecc0cdf808ddbf11421f81e137adefad22257
-
SHA512
509065c1292bbf41b06a0c20923c83765814d3d044a8ec6715bbfe855e35ac30a5be884cc7c090067122722852e7db2d9665f3ee09a7afe111312dff3586402e
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHaFHumBqo+ichfvo5:Yh+ZkldoPK8YaFH/IlZhf2
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-