General
-
Target
Urget Contract Action.zip
-
Size
424KB
-
Sample
250404-dtj6dayxcx
-
MD5
607104ec5c797bd46a0a6bc76bfac512
-
SHA1
d6c5562c2c63c5d164cf09ab8c829cf8d4ed1581
-
SHA256
137cfbc6611add95e7dd00247098efc9aa4b16771d62c20a5d149f2181da6d6c
-
SHA512
0fdd49b6939bcf281a2cbcd50ab53989864a498e37dbf0d55ebc8f2e1ec3ee14c41ec52c8828d99f1ca612d95a53f22d2c76c0d8aa219740f00a736d9573b0b2
-
SSDEEP
12288:ZUpblYhNXCaq0DXHyLoo4Re+Bo3KhiJeHMgV+awgp:ZUpblYDXZDXKFJ+BOKSi+5G
Static task
static1
Behavioral task
behavioral1
Sample
Urget Contract Action.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Urget Contract Action.eml
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Urgent Contract Action.pdf.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Urget Contract Action.zip
-
Size
424KB
-
MD5
607104ec5c797bd46a0a6bc76bfac512
-
SHA1
d6c5562c2c63c5d164cf09ab8c829cf8d4ed1581
-
SHA256
137cfbc6611add95e7dd00247098efc9aa4b16771d62c20a5d149f2181da6d6c
-
SHA512
0fdd49b6939bcf281a2cbcd50ab53989864a498e37dbf0d55ebc8f2e1ec3ee14c41ec52c8828d99f1ca612d95a53f22d2c76c0d8aa219740f00a736d9573b0b2
-
SSDEEP
12288:ZUpblYhNXCaq0DXHyLoo4Re+Bo3KhiJeHMgV+awgp:ZUpblYDXZDXKFJ+BOKSi+5G
Score1/10 -
-
-
Target
Urget Contract Action.eml
-
Size
604KB
-
MD5
048c02e929690bcb0a537d08e71f6b50
-
SHA1
e35f34239708f1d2ac63dc88366dcb3686d0d1eb
-
SHA256
c5fe32e5de97a1c0ff01c7bcbc99d7086a485b6df9ac7cdb37e906f6e1d01da3
-
SHA512
bd942387e85c4981cba4617089728958e7bf163efb73ee5624e3f5e409552426a3ee67d0900bca18dc089552d5c855ca99dbf5115f4293eb5162e346a68fcaa9
-
SSDEEP
12288:G35ETPjPNu1JoTIIu4Q3H3KNgrYq/6lm2pNRs/P7IunP9m4QSmWveSI:PPDkreIItQqev/Qmofs/TdnPvPpeB
Score3/10 -
-
-
Target
Urgent Contract Action.pdf.exe
-
Size
431KB
-
MD5
fbbdc39af1139aebba4da004475e8839
-
SHA1
de5c8d858e6e41da715dca1c019df0bfb92d32c0
-
SHA256
630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
-
SHA512
74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
SSDEEP
12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63
Score10/10-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Loads dropped DLL
-