General

  • Target

    PO-4520057666.zip

  • Size

    807KB

  • Sample

    241107-scsthsvarp

  • MD5

    1aef4a0d8fe3d572a193df68b5cd832a

  • SHA1

    8e04340c361f7ee9fcb8de1aea60a4eb397ed40c

  • SHA256

    089d3782045d386eda4f04a731595c1f0da1d8bfb4bb0afb1f5a149ddc987b55

  • SHA512

    8d1576dc25f44e56167180a5bfaf04c947b8580a2bdfdf0f8781dd77516b4e19a15035a5c0562a5fc5ac1df4028c7112cc75c4d8b9dd698f4c027ffa533bd4af

  • SSDEEP

    12288:2t7YGZR3uW7WYExYC7+WixEZzwpQcMP8Mv+oycH8C7qr38Mf5nzVQi7A:2t7Y8R39qYXC6ruziMP8Mvt81L8Mzc

Score
7/10

Malware Config

Targets

    • Target

      PO-4520057666.exe

    • Size

      1.1MB

    • MD5

      8aa7ce5be8031fd959ba8eeab21563e2

    • SHA1

      c71c9aed980df363868e17a659b17271bed4296c

    • SHA256

      e1fa5c71c9fab660f8312332cf26e8c78a216ecdbaaa47a4ca04a57f6946bc22

    • SHA512

      3aacea624f444151992dde56fc8889bb50da5019d44872390ec91fd1107e76636bb2e71d3d5dec1aff99c06603dc22bb1d09a6b05002f75c87221fd31874586c

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaXIkXuMJhQjJ8MhA:mJZoQrbTFZY1iaXIkwm

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks