General

  • Target

    Swift Copy Of Pending payment.exe

  • Size

    1.1MB

  • Sample

    241016-eym89swfmq

  • MD5

    9b679868083e626372cfb2c14b41a1e7

  • SHA1

    577dce2d101fbf4876b68ff6c3ad7ea4b165fa08

  • SHA256

    a461236694dd8f695abc0e9ca8df64dcce9c9d3ac081e624ab7275dca99d4a5b

  • SHA512

    61ea89bd7bd923c334c7730c9d10b8a65516c39fa78e0d59f65e43fb2112f2751649d28b47f5e9271e171809a7b7cd725edcd567ad671a1526fbaf80a1b31cfa

  • SSDEEP

    24576:WfmMv6Ckr7Mny5Qtd5GWo1Bk8bJKcdO3uZMYBBvWNaiT7sq:W3v+7/5QtLGWoD9I6ZMYBBOIiT7sq

Score
7/10

Malware Config

Targets

    • Target

      Swift Copy Of Pending payment.exe

    • Size

      1.1MB

    • MD5

      9b679868083e626372cfb2c14b41a1e7

    • SHA1

      577dce2d101fbf4876b68ff6c3ad7ea4b165fa08

    • SHA256

      a461236694dd8f695abc0e9ca8df64dcce9c9d3ac081e624ab7275dca99d4a5b

    • SHA512

      61ea89bd7bd923c334c7730c9d10b8a65516c39fa78e0d59f65e43fb2112f2751649d28b47f5e9271e171809a7b7cd725edcd567ad671a1526fbaf80a1b31cfa

    • SSDEEP

      24576:WfmMv6Ckr7Mny5Qtd5GWo1Bk8bJKcdO3uZMYBBvWNaiT7sq:W3v+7/5QtLGWoD9I6ZMYBBOIiT7sq

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks