General
-
Target
Commercial Invoice & PL - TWNYC3469342.scr
-
Size
787KB
-
Sample
201109-vvkm68ytsa
-
MD5
cc41e556572c9bf5ba045f89198f7b98
-
SHA1
47f2431463872774d27e3ce89999bc69b0fdab2f
-
SHA256
2b123fa8f08714a93a01db03bdf4ecd31d268d5d279900b9c67fec861c2bc11c
-
SHA512
72391718a6e316bf8e72a2f2dfb4b5d889034c2300307562d4548ef6be896632eb23f0203f69c2b93a01bdb154ce8ba2512b0bc4aa832acea028f6d283428525
Static task
static1
Behavioral task
behavioral1
Sample
Commercial Invoice & PL - TWNYC3469342.scr
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Commercial Invoice & PL - TWNYC3469342.scr
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Commercial Invoice & PL - TWNYC3469342.scr
-
Size
787KB
-
MD5
cc41e556572c9bf5ba045f89198f7b98
-
SHA1
47f2431463872774d27e3ce89999bc69b0fdab2f
-
SHA256
2b123fa8f08714a93a01db03bdf4ecd31d268d5d279900b9c67fec861c2bc11c
-
SHA512
72391718a6e316bf8e72a2f2dfb4b5d889034c2300307562d4548ef6be896632eb23f0203f69c2b93a01bdb154ce8ba2512b0bc4aa832acea028f6d283428525
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-