General
-
Target
Revised Order Copy.zip
-
Size
807KB
-
Sample
241107-sc4wsavbjk
-
MD5
0f4cf0577995b8ff708cc44d70679548
-
SHA1
5c1ef10790b3a6306827cd981dfd6f3932472835
-
SHA256
83964df9dacee5c309b82bfae29132cc31c1c387d0fd58e2a1874daaafed4d5a
-
SHA512
bc27de7e4872f232d1133cc8b7de4ee6885e41ab75ba06776327489dc716f0df9588dd70093e66c5074fa39a934de711bf1fd94dd10196fd454408fa7a9ce2c5
-
SSDEEP
12288:It7YGZR3uW7WYExYC7+WixEZzwpQcMP8Mv+oycH8C7qr38Mf5nzVQi7A:It7Y8R39qYXC6ruziMP8Mvt81L8Mz0
Static task
static1
Behavioral task
behavioral1
Sample
Revised Order Copy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Revised Order Copy.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Revised Order Copy.exe
-
Size
1.1MB
-
MD5
8aa7ce5be8031fd959ba8eeab21563e2
-
SHA1
c71c9aed980df363868e17a659b17271bed4296c
-
SHA256
e1fa5c71c9fab660f8312332cf26e8c78a216ecdbaaa47a4ca04a57f6946bc22
-
SHA512
3aacea624f444151992dde56fc8889bb50da5019d44872390ec91fd1107e76636bb2e71d3d5dec1aff99c06603dc22bb1d09a6b05002f75c87221fd31874586c
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaXIkXuMJhQjJ8MhA:mJZoQrbTFZY1iaXIkwm
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-