General

  • Target

    CONTRACT COPY PRN00720387_pdf.exe

  • Size

    799KB

  • Sample

    241121-nkhlas1ele

  • MD5

    901aac855d2dec6202d1ec5a6424614d

  • SHA1

    82b0bd78b511bc9fd47f11fb03a19b15e377b12d

  • SHA256

    5dff59bba594b0d87c418b49f4d867b83d39bb327409ee7f2ba160964c8422cd

  • SHA512

    a93d71198748878b72fbdd267b733da31745a66478756d21a0c11bed1481b352897d1bb721ff42d6ad27b3c5fd53c08a818986d684e5ef7b98bb1bf9d1a319ac

  • SSDEEP

    12288:47LuH9zeOBbolPGOOuLwr8m+QBvlP9Ia8GIbPYkAdwvLRPC6Oe73MFcN:cL7+olPGlNAKIacPYkAevLRPJye

Malware Config

Targets

    • Target

      CONTRACT COPY PRN00720387_pdf.exe

    • Size

      799KB

    • MD5

      901aac855d2dec6202d1ec5a6424614d

    • SHA1

      82b0bd78b511bc9fd47f11fb03a19b15e377b12d

    • SHA256

      5dff59bba594b0d87c418b49f4d867b83d39bb327409ee7f2ba160964c8422cd

    • SHA512

      a93d71198748878b72fbdd267b733da31745a66478756d21a0c11bed1481b352897d1bb721ff42d6ad27b3c5fd53c08a818986d684e5ef7b98bb1bf9d1a319ac

    • SSDEEP

      12288:47LuH9zeOBbolPGOOuLwr8m+QBvlP9Ia8GIbPYkAdwvLRPC6Oe73MFcN:cL7+olPGlNAKIacPYkAevLRPJye

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks