General
-
Target
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa
-
Size
8KB
-
Sample
220615-e91nqshdg7
-
MD5
afecb68b3d4672feebc7ec0653e2fd65
-
SHA1
58ed0aba9bce8c245f60954492ec84499a68cabc
-
SHA256
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa
-
SHA512
c5458e07f0581a2f1514afb9509310f853eacf31019667e639807d28f915ff0f9537cb07316d2f74c4ec208a166e765f5322a2e615c43408e59f2ad89b58a950
Static task
static1
Behavioral task
behavioral1
Sample
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.fare4travels.com - Port:
587 - Username:
[email protected] - Password:
Atc@0444@
Targets
-
-
Target
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa
-
Size
8KB
-
MD5
afecb68b3d4672feebc7ec0653e2fd65
-
SHA1
58ed0aba9bce8c245f60954492ec84499a68cabc
-
SHA256
2ab6e326217b111e992a9ec57847941fdb6dfc177dc443db16c34383978a95fa
-
SHA512
c5458e07f0581a2f1514afb9509310f853eacf31019667e639807d28f915ff0f9537cb07316d2f74c4ec208a166e765f5322a2e615c43408e59f2ad89b58a950
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-