General
-
Target
363b093f35e77a69b1fbdf8ae8b6c7016661f1857190f0d3e42357fda73b2f58
-
Size
446KB
-
Sample
220521-bwpgrsffbn
-
MD5
ff667b34ee3f1b1cabc475f678222c76
-
SHA1
7527af4f3b1a1b0a6f9edb49ec7d22b820e269e0
-
SHA256
363b093f35e77a69b1fbdf8ae8b6c7016661f1857190f0d3e42357fda73b2f58
-
SHA512
465d26269b6c03e6dd7b349ea4ec14adf8acef83e8a67b335528bbe1e31e6b7c3da834bd3264b57664375acaafccf3de770d8d85f29957c6acc58dd87db225d5
Behavioral task
behavioral1
Sample
Sales Order 5402.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Sales Order 5402.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
johnsonpikyu@yandex.com - Password:
cr*fDaW&m@2y6u
Targets
-
-
Target
Sales Order 5402.exe
-
Size
515KB
-
MD5
8d1958f3ff1bd3cb56b6c9e6e0d75c4a
-
SHA1
596a1a28554786ce343e9ea0aaa69a76bc28d8e2
-
SHA256
7b01e7eaa276275cb58f890900e7852f59be59905804ecae7d0011a58c8ca2fa
-
SHA512
9835fe7298aa1c567aee2855ccb8aafe393c7933af06346d55e441db423b891982c5aa244c56263452832e52de59c3d926db5c27dbcc73b35861e7cab78f2eee
Score10/10-
Accesses Microsoft Outlook profiles
-