General
-
Target
8eb08f80b960b9400dec60b4868b671c11d55dc217eca76ce34e7627501bc790
-
Size
10KB
-
Sample
240923-p9qtmsxbkn
-
MD5
47e219b854917954d2a651b2e39d2696
-
SHA1
24a1808365499dbe56b5e1aca36d0171e1d2ea6c
-
SHA256
8eb08f80b960b9400dec60b4868b671c11d55dc217eca76ce34e7627501bc790
-
SHA512
35f83042d6e0e76531584511e0bccd1710f543b523005795c61d6151b5b0a0cd9acbfe75c25a8776ddda44b828f3b371cb7de69f0fdca7e70ffa288c5fcf78ea
-
SSDEEP
192:KpcTn/Ahm8A1/RqYwMcwO4Gs8luTYtP1Fae2HjOUmlejJwQLeRcz6JG16js75G:3wq/YZMcl4GfluTe1Fx2SUnjGQLeKjHU
Static task
static1
Behavioral task
behavioral1
Sample
faktura_6240384907·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faktura_6240384907·pdf.vbs
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
faktura_6240384907·pdf.vbs
-
Size
33KB
-
MD5
23a871278b8175dff3c51ea64e258d87
-
SHA1
099366ae409ea0908fbb3facf931028289e48e78
-
SHA256
a860af9a977d8fc6ad99942d066df0d8ca618c449eb3a3190fc3d49d6755ef17
-
SHA512
ce7ebf6cb316057556ebaf77de487985ee566fae67a788db6351b091c43a0af5cdab34bde1c8e242ce81c971b39f83c8bcb98d8fe02a12f36e1b14ddfa80e8e9
-
SSDEEP
384:3k7jqtTDo8r1VebE3KUOOpJWUvZil1pFz:U7mTU8ribNoQUvA1ph
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-