General
-
Target
coppy.exe
-
Size
1.1MB
-
Sample
221116-299b7sdc67
-
MD5
57e39c48e784b3a979493e1945139cb7
-
SHA1
3074d590c3ffdf65c0516cf18d816da9978cb321
-
SHA256
5d5656bf50bf4d14a6b4129c7f3dfd9f446b98df3edeaf2d9036a77d49f52349
-
SHA512
d816fe98485feade6f968acdf5be92f71c77a12aba089ada7451f30e22c8f0a16cafe77bfa7bf7cb94e8dff822bb5c675b9937eb53bab9957f91e9961ac0df56
-
SSDEEP
24576:gVnc4FxHeu14NcBZODcHYZrq1MpGpPX6kUvZdEL:0nRFxHehNhDcRe+PavXEL
Static task
static1
Behavioral task
behavioral1
Sample
coppy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
coppy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.michelethorne.com - Port:
587 - Username:
[email protected] - Password:
Goodplace1@1
Targets
-
-
Target
coppy.exe
-
Size
1.1MB
-
MD5
57e39c48e784b3a979493e1945139cb7
-
SHA1
3074d590c3ffdf65c0516cf18d816da9978cb321
-
SHA256
5d5656bf50bf4d14a6b4129c7f3dfd9f446b98df3edeaf2d9036a77d49f52349
-
SHA512
d816fe98485feade6f968acdf5be92f71c77a12aba089ada7451f30e22c8f0a16cafe77bfa7bf7cb94e8dff822bb5c675b9937eb53bab9957f91e9961ac0df56
-
SSDEEP
24576:gVnc4FxHeu14NcBZODcHYZrq1MpGpPX6kUvZdEL:0nRFxHehNhDcRe+PavXEL
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-