General
-
Target
New Order List Inquiry #657833.exe
-
Size
890KB
-
Sample
250205-lxbmeasphq
-
MD5
f796f47e46309a607d9d1eaeeff4f0ee
-
SHA1
c70dd34c43d1d1e6941afdba082bb8f728ec00fa
-
SHA256
23b539bdd1eedbc9ca06fd431fc39f5d9696ad1dc455f0688ccfd0350c21e141
-
SHA512
80cd82c73a58f448d980784fd91a77059dec9a9c9d87293942966471fcf8ab0253038e975c0a3319a0d5d24e9edcd485c9b5cbea1930bf0932298e4898df2c94
-
SSDEEP
24576:QPyqE0GP4TlFzAXvc7zaDuReqr/sblNP9Ex0:IE0XGf9DWp/sblNVE2
Static task
static1
Behavioral task
behavioral1
Sample
New Order List Inquiry #657833.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order List Inquiry #657833.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
New Order List Inquiry #657833.exe
-
Size
890KB
-
MD5
f796f47e46309a607d9d1eaeeff4f0ee
-
SHA1
c70dd34c43d1d1e6941afdba082bb8f728ec00fa
-
SHA256
23b539bdd1eedbc9ca06fd431fc39f5d9696ad1dc455f0688ccfd0350c21e141
-
SHA512
80cd82c73a58f448d980784fd91a77059dec9a9c9d87293942966471fcf8ab0253038e975c0a3319a0d5d24e9edcd485c9b5cbea1930bf0932298e4898df2c94
-
SSDEEP
24576:QPyqE0GP4TlFzAXvc7zaDuReqr/sblNP9Ex0:IE0XGf9DWp/sblNVE2
-
Guloader family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a4dd044bcd94e9b3370ccf095b31f896
-
SHA1
17c78201323ab2095bc53184aa8267c9187d5173
-
SHA256
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
-
SHA512
87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
SSDEEP
192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1