General
-
Target
c700c46fed0dc1adb32a9721a3ca43c2ba9b2a5f6fcb94b2df6defb14aaac19f
-
Size
929KB
-
Sample
241101-raf69szkgx
-
MD5
a45bd090000c864bea85e195ddc3f929
-
SHA1
84d6712ca8b641b338b114ba6701a5a72e592a7e
-
SHA256
c700c46fed0dc1adb32a9721a3ca43c2ba9b2a5f6fcb94b2df6defb14aaac19f
-
SHA512
4e60abd9166d553abeef8ef2a686ce95342aee47cd42908aea06fe5f016763d0606f38b173efa72f11af800a760b4eab6f93555687692ce9ee58369c1e40a9a3
-
SSDEEP
24576:ebyyZqCCqMsKXQ4qsRj5/dwxBP7Fw5VBp2:5yUWKXzFR8xBDUVu
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order _985328.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Purchase Order _985328.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Purchase Order _985328.exe
-
Size
1.4MB
-
MD5
bdfd5584de8569ac84cd5566875c5464
-
SHA1
3130ac63f0109d4cd5ca00f96d05c29df5f73dfb
-
SHA256
d1ed381d12ccad419dcc8e8fc14179ef453e03ddd57d6842955ea9ec5176f484
-
SHA512
848b932396628c3cfabdf350c95b75b38a29d2b575ca4a46da1e1fd469038fb8d388cc1febc84914a77dde3247d98f3117765cb9ad1deb58916dd42d7399e99d
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8axkozf5RxwxnpPF+5NBL2mV:4TvC/MTQYxsWR7axkozuxnp2N8m
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-