General
-
Target
Debit note Jan-Jul 2024.zip
-
Size
714KB
-
Sample
240823-fn5agawgje
-
MD5
2944f9e881476a76760fa3e467f99a59
-
SHA1
0a1841764140cd62302b965f3c1b914d59668646
-
SHA256
41b64e5a0748356023f0050581296047bb1e2b88794509dccf978a20a5e0f86f
-
SHA512
4940fde38487381c1ec5d959acab6cee702c1362eadcee2bf1f9353364496cd90c6a55e173909de9a130d0e1e0e8bdecc88c42163001873b0014f138eb5c4ab9
-
SSDEEP
12288:cSac9e5D+bBnKf4poVrVhc0JNcEj8LZzoIBrPlcdqzhvKrN6TCvKgkzIjbRrW37k:Ga4+l2Jxj8OIBblcdq4agTREUu/wMo
Behavioral task
behavioral1
Sample
Debit note Jan-Jul 2024.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
Debit note Jan-Jul 2024.exe
-
Size
740KB
-
MD5
8379ff838164b21dbd287611dae13ecb
-
SHA1
d19e11692605f70504de8ab04a992627985facea
-
SHA256
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23
-
SHA512
a4a2db5afd04a7f657520d2b84f19627a3381db5996803283868020dab1f89b56b3367585b10b2762ef57d8581fff0c36b989d5e00a63e7282813ee04d0e2b77
-
SSDEEP
12288:osHzOUNUSB/o5LsI1uwajJ5yvv1l2/BXyZPlcd2zhRKzdWTWTKgYzajbRtML7RQH:7iUmSB/o5d1ubcvKC5lcd2WUg3RquUjs
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-