General
-
Target
2a4785b0ab1e0bad922f38e44773dc4025f43f495272d989537c8306db87af0a
-
Size
652KB
-
Sample
221106-ldke7sdfb4
-
MD5
5098e807f62041aaec768eb984bbc190
-
SHA1
ad51c16fde92de08f548635a22e2bf0b21907b2a
-
SHA256
2a4785b0ab1e0bad922f38e44773dc4025f43f495272d989537c8306db87af0a
-
SHA512
3e8cb8177eb7bd788b348209a1db3903226d1e1b047e493d5bec432a508ece29bf9893fc7c8d0b6061d543fee65d98d5dec4cbbca69ff77cebf23aa651d57443
-
SSDEEP
12288:rwIULLcMcF3JzeL3CJeEUTu608tHxrP3eghcwY7EubQz58TcXm:PUXcxF3JzezCJeEQuGtRb3eqkoCo
Static task
static1
Behavioral task
behavioral1
Sample
2a4785b0ab1e0bad922f38e44773dc4025f43f495272d989537c8306db87af0a.exe
Resource
win7-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.tulsilogistics.com - Port:
587 - Username:
[email protected] - Password:
Test@$$123
Targets
-
-
Target
2a4785b0ab1e0bad922f38e44773dc4025f43f495272d989537c8306db87af0a
-
Size
652KB
-
MD5
5098e807f62041aaec768eb984bbc190
-
SHA1
ad51c16fde92de08f548635a22e2bf0b21907b2a
-
SHA256
2a4785b0ab1e0bad922f38e44773dc4025f43f495272d989537c8306db87af0a
-
SHA512
3e8cb8177eb7bd788b348209a1db3903226d1e1b047e493d5bec432a508ece29bf9893fc7c8d0b6061d543fee65d98d5dec4cbbca69ff77cebf23aa651d57443
-
SSDEEP
12288:rwIULLcMcF3JzeL3CJeEUTu608tHxrP3eghcwY7EubQz58TcXm:PUXcxF3JzezCJeEQuGtRb3eqkoCo
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-