General
-
Target
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb
-
Size
1.1MB
-
Sample
221122-xrl2qshc81
-
MD5
10d287e199767a9cb43c94c85aad2567
-
SHA1
efffb39548ad37d49184b80a339025aad2998805
-
SHA256
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb
-
SHA512
667f72f2e2c17cce915ce8860442b45d8fa87158d8b78b88dd620148cca7afbac721fc815afd76d2164d28c71d024eac1903e91e4ee0af87c9457f6e3dfaf162
-
SSDEEP
24576:/7/4TD8UsxKicnEsQfuijuBhE3NpEM4OEU8Bfj:jQTIUsVcEsQ3aEg5jB
Static task
static1
Behavioral task
behavioral1
Sample
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb
-
Size
1.1MB
-
MD5
10d287e199767a9cb43c94c85aad2567
-
SHA1
efffb39548ad37d49184b80a339025aad2998805
-
SHA256
32520b0cab62632a2377943757173c44452c2940d1a63aa8636ae4fd78b5c6cb
-
SHA512
667f72f2e2c17cce915ce8860442b45d8fa87158d8b78b88dd620148cca7afbac721fc815afd76d2164d28c71d024eac1903e91e4ee0af87c9457f6e3dfaf162
-
SSDEEP
24576:/7/4TD8UsxKicnEsQfuijuBhE3NpEM4OEU8Bfj:jQTIUsVcEsQ3aEg5jB
-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-