General

  • Target

    83964df9dacee5c309b82bfae29132cc31c1c387d0fd58e2a1874daaafed4d5a

  • Size

    807KB

  • Sample

    241107-rf21xstejf

  • MD5

    0f4cf0577995b8ff708cc44d70679548

  • SHA1

    5c1ef10790b3a6306827cd981dfd6f3932472835

  • SHA256

    83964df9dacee5c309b82bfae29132cc31c1c387d0fd58e2a1874daaafed4d5a

  • SHA512

    bc27de7e4872f232d1133cc8b7de4ee6885e41ab75ba06776327489dc716f0df9588dd70093e66c5074fa39a934de711bf1fd94dd10196fd454408fa7a9ce2c5

  • SSDEEP

    12288:It7YGZR3uW7WYExYC7+WixEZzwpQcMP8Mv+oycH8C7qr38Mf5nzVQi7A:It7Y8R39qYXC6ruziMP8Mvt81L8Mz0

Score
7/10

Malware Config

Targets

    • Target

      Revised Order Copy.exe

    • Size

      1.1MB

    • MD5

      8aa7ce5be8031fd959ba8eeab21563e2

    • SHA1

      c71c9aed980df363868e17a659b17271bed4296c

    • SHA256

      e1fa5c71c9fab660f8312332cf26e8c78a216ecdbaaa47a4ca04a57f6946bc22

    • SHA512

      3aacea624f444151992dde56fc8889bb50da5019d44872390ec91fd1107e76636bb2e71d3d5dec1aff99c06603dc22bb1d09a6b05002f75c87221fd31874586c

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaXIkXuMJhQjJ8MhA:mJZoQrbTFZY1iaXIkwm

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks