General

  • Target

    Loacker-In-Service Agreement.pdf

  • Size

    82KB

  • Sample

    241120-qfa2rsxamc

  • MD5

    f44d8307426645864e0a8cb14d1cb929

  • SHA1

    7e012ebb9b52565167f28f7dbea8c3db2bedaa4b

  • SHA256

    37e412adf7b3f6e9a5dd59289d50c82ca82d186b5693476ad8f7706d30c13831

  • SHA512

    74e120a6fce1555ae5f8ecdde63ab2eb0ac55d9b2a3be5128fc13fcfd14dc899c3ab3553be7ccef171932be9512003425364090b9f965b79d2ba70c1e3c8b045

  • SSDEEP

    1536:yIx0urO40B9vEMGxdBPmaUVx+YcqYnPVzuyPxupvMYm0/x4ACdf0O3qpM+s/lMgq:5quLMEZxd9KxpcqYdu0cvMYm0/SXOO3I

Malware Config

Targets

    • Target

      Loacker-In-Service Agreement.pdf

    • Size

      82KB

    • MD5

      f44d8307426645864e0a8cb14d1cb929

    • SHA1

      7e012ebb9b52565167f28f7dbea8c3db2bedaa4b

    • SHA256

      37e412adf7b3f6e9a5dd59289d50c82ca82d186b5693476ad8f7706d30c13831

    • SHA512

      74e120a6fce1555ae5f8ecdde63ab2eb0ac55d9b2a3be5128fc13fcfd14dc899c3ab3553be7ccef171932be9512003425364090b9f965b79d2ba70c1e3c8b045

    • SSDEEP

      1536:yIx0urO40B9vEMGxdBPmaUVx+YcqYnPVzuyPxupvMYm0/x4ACdf0O3qpM+s/lMgq:5quLMEZxd9KxpcqYdu0cvMYm0/SXOO3I

    • A potential corporate email address has been identified in the URL: [email protected]

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand MICROSOFT.

MITRE ATT&CK Enterprise v15

Tasks