General
-
Target
4287d4953f90068ba671e101587a2e803d896462eeece13cde233a2b965503b8
-
Size
601KB
-
Sample
221107-qqe4gahec7
-
MD5
0ddec64da0c22eec1144cd53f2d74880
-
SHA1
eb6573dfbb50615d8711c315adca784e0a30d12d
-
SHA256
4287d4953f90068ba671e101587a2e803d896462eeece13cde233a2b965503b8
-
SHA512
b83952c287f999aa653eacd203e7d316ba7f5472753d5455544a40fd22c8c1e489bbf8184eb12ca92ffe9027b70b0ec2ff8478b8bf20060a68738ed829ff5a10
-
SSDEEP
12288:SuQRGw4W1xZ++u9YixSRsGFV4ljdw8h2qCwki:SLRG/W1xZ+J9pSCM4lJ
Static task
static1
Behavioral task
behavioral1
Sample
4287d4953f90068ba671e101587a2e803d896462eeece13cde233a2b965503b8.exe
Resource
win7-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.yahoo.com - Port:
587 - Username:
[email protected] - Password:
london20
Targets
-
-
Target
4287d4953f90068ba671e101587a2e803d896462eeece13cde233a2b965503b8
-
Size
601KB
-
MD5
0ddec64da0c22eec1144cd53f2d74880
-
SHA1
eb6573dfbb50615d8711c315adca784e0a30d12d
-
SHA256
4287d4953f90068ba671e101587a2e803d896462eeece13cde233a2b965503b8
-
SHA512
b83952c287f999aa653eacd203e7d316ba7f5472753d5455544a40fd22c8c1e489bbf8184eb12ca92ffe9027b70b0ec2ff8478b8bf20060a68738ed829ff5a10
-
SSDEEP
12288:SuQRGw4W1xZ++u9YixSRsGFV4ljdw8h2qCwki:SLRG/W1xZ+J9pSCM4lJ
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-