General
-
Target
30102024_0118_29102024_Bestellung.7z
-
Size
742KB
-
Sample
241030-bpbx4atemp
-
MD5
45001751aae993a57dc7433617d114ff
-
SHA1
d1837bd7813f0b9fcc003035095521e466e0b6a5
-
SHA256
b13417ae29a0b5dc10cb8176006034c61d41fd9e20037c4023ab514b193fa69a
-
SHA512
446020ced9dc03c90785686cfb879b9f54013cc78fa3444a1a052e46c098c5f8948835b5f067b27fbf9a34b996875a6bb88b4a246574ef2c9d02d37569aab33f
-
SSDEEP
12288:q3Npn7fRLf36ORGbdJ4M50PwpwKP2ZzIevIeOrMEAZvRrkYCHRttl9jjpCuB1Lwa:q3NpzRz36oJIpV2ZzSeuMEATrluRttll
Static task
static1
Behavioral task
behavioral1
Sample
Bestellung.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bestellung.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Bestellung.exe
-
Size
804KB
-
MD5
c56f440f15955f0cae85df17d5a52140
-
SHA1
3c5c933bf8b68b04f621a5c70c9562d06e857bbd
-
SHA256
d539aa17bfa95bc25c81308a99a1c834cb28ad23f1ce8bc3715066471bd5d0f7
-
SHA512
7b191331b52c99ab9bac9c12be29d59f7efb705d4af1efdee2d05b887143398e8442f11664ae4c4b6716ecff2a729a5496b04c6f9e3fbc97e211d2b50c86312c
-
SSDEEP
24576:qG+yqROz6skIpE2NVPl7LE8oy9jRKta3uja581CL:NMRnsn1NVt7L7o/ap
Score10/10-
Guloader family
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
192639861e3dc2dc5c08bb8f8c7260d5
-
SHA1
58d30e460609e22fa0098bc27d928b689ef9af78
-
SHA256
23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
-
SHA512
6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
SSDEEP
192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
Score3/10 -