General
-
Target
da88d30253ac87e5a230bd33ff3e89b66b8c8634d7541208bc3d77dec3b5b04f
-
Size
971KB
-
Sample
220521-mnt8tscba4
-
MD5
05e36fe3e40fb7f3329c2183db1a6d9f
-
SHA1
402d9981038ff5500caebb74ecbb2f5bb97046ca
-
SHA256
da88d30253ac87e5a230bd33ff3e89b66b8c8634d7541208bc3d77dec3b5b04f
-
SHA512
30df2aa56998b35c4fc76de859ac071bdd8bea3587ad54f560473d460317d328099b6dceabc74c19850234516840b601273dbe14508f059052a66544bf58dda3
Static task
static1
Behavioral task
behavioral1
Sample
file222.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
file222.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
zstcznz.org - Port:
587 - Username:
[email protected] - Password:
makonyo@2017
Targets
-
-
Target
file222.exe
-
Size
1.4MB
-
MD5
c9d56cb33b65cda35b2982afc41bc715
-
SHA1
b1e5ea66b740109e438142b0db1bab5eb474c30e
-
SHA256
69683827d1c627e34cd0c916bd53c3d1ab75c1bb48caa57543f1eaeb315f4f2d
-
SHA512
058b32cb57eab4d3eb7d1d6b778421f1f1513b46cae03aa3fc98f7f3c9c0a85a4f47a398f054b6366d70285836e795b2fafe04133e1927934e028f271446ac3d
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-