General
-
Target
Loacker-In-Service Agreement.pdf
-
Size
82KB
-
Sample
241120-qfa2rsxamc
-
MD5
f44d8307426645864e0a8cb14d1cb929
-
SHA1
7e012ebb9b52565167f28f7dbea8c3db2bedaa4b
-
SHA256
37e412adf7b3f6e9a5dd59289d50c82ca82d186b5693476ad8f7706d30c13831
-
SHA512
74e120a6fce1555ae5f8ecdde63ab2eb0ac55d9b2a3be5128fc13fcfd14dc899c3ab3553be7ccef171932be9512003425364090b9f965b79d2ba70c1e3c8b045
-
SSDEEP
1536:yIx0urO40B9vEMGxdBPmaUVx+YcqYnPVzuyPxupvMYm0/x4ACdf0O3qpM+s/lMgq:5quLMEZxd9KxpcqYdu0cvMYm0/SXOO3I
Behavioral task
behavioral1
Sample
Loacker-In-Service Agreement.pdf
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Loacker-In-Service Agreement.pdf
-
Size
82KB
-
MD5
f44d8307426645864e0a8cb14d1cb929
-
SHA1
7e012ebb9b52565167f28f7dbea8c3db2bedaa4b
-
SHA256
37e412adf7b3f6e9a5dd59289d50c82ca82d186b5693476ad8f7706d30c13831
-
SHA512
74e120a6fce1555ae5f8ecdde63ab2eb0ac55d9b2a3be5128fc13fcfd14dc899c3ab3553be7ccef171932be9512003425364090b9f965b79d2ba70c1e3c8b045
-
SSDEEP
1536:yIx0urO40B9vEMGxdBPmaUVx+YcqYnPVzuyPxupvMYm0/x4ACdf0O3qpM+s/lMgq:5quLMEZxd9KxpcqYdu0cvMYm0/SXOO3I
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-