General
-
Target
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848
-
Size
583KB
-
Sample
220619-3tfkmagcbk
-
MD5
422a3d2a123e4017f496b35cf6c82960
-
SHA1
33985325dd64e06a3e3af0c540073eefd07d9596
-
SHA256
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848
-
SHA512
0d8ce461682e7d161ebc160a3f6dc352f33dcaef2134d8fde0426b17e5ff7ad4ed29203835b82f06e645661d6444c9debc86978c5f0032ee9927be2099119166
Static task
static1
Behavioral task
behavioral1
Sample
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848
-
Size
583KB
-
MD5
422a3d2a123e4017f496b35cf6c82960
-
SHA1
33985325dd64e06a3e3af0c540073eefd07d9596
-
SHA256
33e023867f424fdae14f55d5c61c247fa0f9652d09d55b83945fc4382f230848
-
SHA512
0d8ce461682e7d161ebc160a3f6dc352f33dcaef2134d8fde0426b17e5ff7ad4ed29203835b82f06e645661d6444c9debc86978c5f0032ee9927be2099119166
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-