General

  • Target

    INVOICE.PDF.exe

  • Size

    776KB

  • Sample

    200731-n9celft9na

  • MD5

    7ad2834ccb90213af7c5c4411eb04253

  • SHA1

    ff5fa39d9302c64669c65f37547915b4252f42ba

  • SHA256

    b8a6818ebadd26de05a88a3938a3fc3ee593184be5448af728f5ff07e7ca2ddc

  • SHA512

    438999d2d64915ebd2f4883f7301221c641cf041e3afdb455af3f5de1f1e763d7552201366cb9b26ecf03f6ac6eba32150ff05cfd94af12fed5c22573b5cb26b

Score
8/10

Malware Config

Targets

    • Target

      INVOICE.PDF.exe

    • Size

      776KB

    • MD5

      7ad2834ccb90213af7c5c4411eb04253

    • SHA1

      ff5fa39d9302c64669c65f37547915b4252f42ba

    • SHA256

      b8a6818ebadd26de05a88a3938a3fc3ee593184be5448af728f5ff07e7ca2ddc

    • SHA512

      438999d2d64915ebd2f4883f7301221c641cf041e3afdb455af3f5de1f1e763d7552201366cb9b26ecf03f6ac6eba32150ff05cfd94af12fed5c22573b5cb26b

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks