General

  • Target

    Debit note Jan-Jul 2024.zip

  • Size

    714KB

  • Sample

    240823-fn5agawgje

  • MD5

    2944f9e881476a76760fa3e467f99a59

  • SHA1

    0a1841764140cd62302b965f3c1b914d59668646

  • SHA256

    41b64e5a0748356023f0050581296047bb1e2b88794509dccf978a20a5e0f86f

  • SHA512

    4940fde38487381c1ec5d959acab6cee702c1362eadcee2bf1f9353364496cd90c6a55e173909de9a130d0e1e0e8bdecc88c42163001873b0014f138eb5c4ab9

  • SSDEEP

    12288:cSac9e5D+bBnKf4poVrVhc0JNcEj8LZzoIBrPlcdqzhvKrN6TCvKgkzIjbRrW37k:Ga4+l2Jxj8OIBblcdq4agTREUu/wMo

Score
7/10

Malware Config

Targets

    • Target

      Debit note Jan-Jul 2024.exe

    • Size

      740KB

    • MD5

      8379ff838164b21dbd287611dae13ecb

    • SHA1

      d19e11692605f70504de8ab04a992627985facea

    • SHA256

      3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23

    • SHA512

      a4a2db5afd04a7f657520d2b84f19627a3381db5996803283868020dab1f89b56b3367585b10b2762ef57d8581fff0c36b989d5e00a63e7282813ee04d0e2b77

    • SSDEEP

      12288:osHzOUNUSB/o5LsI1uwajJ5yvv1l2/BXyZPlcd2zhRKzdWTWTKgYzajbRtML7RQH:7iUmSB/o5d1ubcvKC5lcd2WUg3RquUjs

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks