General
-
Target
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818
-
Size
540KB
-
Sample
220801-s4ee7sbdh2
-
MD5
1180625c9860111880fcd595f197332d
-
SHA1
2366ae74cc62a03b5a77de4e2241b74409a3e42a
-
SHA256
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818
-
SHA512
b2f48683848b250ea61d63ef002d3a8e7086146ed99d52b43ea04acd836a7a3efd6210db76275ec61646bdf3c9ffcca7488f1a66872ea4f21490643b35437948
Static task
static1
Behavioral task
behavioral1
Sample
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818
-
Size
540KB
-
MD5
1180625c9860111880fcd595f197332d
-
SHA1
2366ae74cc62a03b5a77de4e2241b74409a3e42a
-
SHA256
5c1948c5c0c236f1a657d173ab6f85225860459eb30001050da73e9990990818
-
SHA512
b2f48683848b250ea61d63ef002d3a8e7086146ed99d52b43ea04acd836a7a3efd6210db76275ec61646bdf3c9ffcca7488f1a66872ea4f21490643b35437948
Score7/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-