General
-
Target
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b
-
Size
671KB
-
Sample
221001-1ww92shca7
-
MD5
6f554fe5cacb3f8c66b454e57a2fdfb0
-
SHA1
d5177d6d60180fcd03889fc348d6927aa1b85de2
-
SHA256
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b
-
SHA512
b22dc240d2122cb0e29e2eb5beb4d0f003b09dd57411e128dbc0e194758e4002e10cc90324b902ae43b13aa7f13ef4aabf1147d3c3bfe545608edb077b0bca06
-
SSDEEP
6144:FsuXGLCQbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9g:FrQQtqB5urTIoYWBQk1E+VF9mOx960l4
Static task
static1
Behavioral task
behavioral1
Sample
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b
-
Size
671KB
-
MD5
6f554fe5cacb3f8c66b454e57a2fdfb0
-
SHA1
d5177d6d60180fcd03889fc348d6927aa1b85de2
-
SHA256
f6ad655c296fae949e0b5bf9c659f52aa6fd01b39eb7c6306ff15c921f43978b
-
SHA512
b22dc240d2122cb0e29e2eb5beb4d0f003b09dd57411e128dbc0e194758e4002e10cc90324b902ae43b13aa7f13ef4aabf1147d3c3bfe545608edb077b0bca06
-
SSDEEP
6144:FsuXGLCQbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9g:FrQQtqB5urTIoYWBQk1E+VF9mOx960l4
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-