General
-
Target
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e
-
Size
755KB
-
Sample
220712-jjx75sbcf3
-
MD5
91714ff5d013a6c2aefc599c14a8d0e2
-
SHA1
9232ae46800bed747e0fc5db75b2ebfd766d8b72
-
SHA256
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e
-
SHA512
015cc427e31d9c1d5b7e8ce4dade1825117e34e9e063f000a0528f8d26e1a7b034338e8298412201f6ca888c211da31be16ccc0f034decba7aad77f1ea9cfb74
Static task
static1
Behavioral task
behavioral1
Sample
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
grace2016
Targets
-
-
Target
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e
-
Size
755KB
-
MD5
91714ff5d013a6c2aefc599c14a8d0e2
-
SHA1
9232ae46800bed747e0fc5db75b2ebfd766d8b72
-
SHA256
4c1d3fd2efaef75cf8063518a6598e406ade1a4067898ef995504bb3e9456c9e
-
SHA512
015cc427e31d9c1d5b7e8ce4dade1825117e34e9e063f000a0528f8d26e1a7b034338e8298412201f6ca888c211da31be16ccc0f034decba7aad77f1ea9cfb74
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-