General
-
Target
23102024_1406_Paid invoice.cmd.zip
-
Size
1.5MB
-
Sample
241023-reqaqstfjf
-
MD5
a39c5e5ca8633b5c7cf486a3b9f79a7c
-
SHA1
41b80f1d1cefb9a0cc5d43609e8677d228226c92
-
SHA256
ee5dd15af86c986f29a20709faf263065a005512c0281d3769d89d02158421f5
-
SHA512
bc990f51ba3b74ae55727a1eae362fe2ac97df56a131e714cefa48822d7c01fb352218fa907e9619def49b6e45838d138e131501a4281357506a64e7c46f70e7
-
SSDEEP
24576:HxUGhCD9L6YrNRL2U7o8zlBy+c6QfRzkiLalKXiBe22g1tWq0UhtODmz0LcPsKp5:HOICDVVrNRLZo83k6Qf1BakSBZlntODc
Static task
static1
Behavioral task
behavioral1
Sample
Paid invoice.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Paid invoice.cmd
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Paid invoice.cmd
-
Size
5.2MB
-
MD5
73545bdba7c3386f0ea604dd3ab69765
-
SHA1
12f3c0dff67e757519b75a506fad8ae52299d9a6
-
SHA256
18a7fccc4558d6ae5543abcf40c12698f413acc5a9369b1e08540873c0403f12
-
SHA512
0a74e70dcc09641b0e140ab433910582297466539cbe6d114ba772459f7694c9e51a256e699f644588a60df64b78f6a9c60055a902b3b1e51010f17b31e50b7c
-
SSDEEP
49152:Lk9AW3aaP88fGYZDv9IRS4GCRoOXKA+z5X6WE64PuXdDzuZMxxPKp4YkmFhVPSV2:b
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1