General
-
Target
e4230c844861c8285ebe2536d7d34c8febef3a12b8092db1c496911eb315a1a6
-
Size
10KB
-
Sample
240923-te2d4svenb
-
MD5
51df1a2bc013083bfbe61a9da545d171
-
SHA1
13650a7c722626d072c6200fa58c8965180d9b1d
-
SHA256
e4230c844861c8285ebe2536d7d34c8febef3a12b8092db1c496911eb315a1a6
-
SHA512
78d70e4e611f2a6a43e79f942897749f4db3bea2e373c0569ba8aad036b948e72948066d02e91a8722e62d50b85ec4750fc2916dbba205f1329b30cf6f1d3f19
-
SSDEEP
192:qRiyQQxrRL4yGsAa9k2eGo3qwsNahQueKeDoyKzTZ7ow0qx9G:q0AF94XYecwsgXe0y6vs
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD DE OFERTA_23-09-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLICITUD DE OFERTA_23-09-2024·pdf.vbs
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SOLICITUD DE OFERTA_23-09-2024·pdf.vbs
-
Size
28KB
-
MD5
5a65706576c1c8a4021c28a4e1f4016d
-
SHA1
1a736c96a27370ad4848e4c67b2fbda142d76a9d
-
SHA256
8d3fcc51b8c2c9a5dbef3cb0575df9e31319492fc94ccb681cfc4ebc0dba7905
-
SHA512
5e74c3a5d3a8cef461bdee06f57b3b869ca681733f32fcf17b09d4b214f4b3b2d76ec622038153bbc466d4cfb75ee63c2d7110574868272cbfc9f79c0b8bdfb8
-
SSDEEP
768:PIM0cce8YsQcf6B3iYLAT1imcypq5EQUTswhWbN/v5GXr/VkvpcvSZ:PtKT1Ymp2V
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-