General
-
Target
INVOICE.PDF.exe
-
Size
776KB
-
Sample
200731-n9celft9na
-
MD5
7ad2834ccb90213af7c5c4411eb04253
-
SHA1
ff5fa39d9302c64669c65f37547915b4252f42ba
-
SHA256
b8a6818ebadd26de05a88a3938a3fc3ee593184be5448af728f5ff07e7ca2ddc
-
SHA512
438999d2d64915ebd2f4883f7301221c641cf041e3afdb455af3f5de1f1e763d7552201366cb9b26ecf03f6ac6eba32150ff05cfd94af12fed5c22573b5cb26b
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.PDF.exe
Resource
win7
Malware Config
Targets
-
-
Target
INVOICE.PDF.exe
-
Size
776KB
-
MD5
7ad2834ccb90213af7c5c4411eb04253
-
SHA1
ff5fa39d9302c64669c65f37547915b4252f42ba
-
SHA256
b8a6818ebadd26de05a88a3938a3fc3ee593184be5448af728f5ff07e7ca2ddc
-
SHA512
438999d2d64915ebd2f4883f7301221c641cf041e3afdb455af3f5de1f1e763d7552201366cb9b26ecf03f6ac6eba32150ff05cfd94af12fed5c22573b5cb26b
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-