General
-
Target
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c
-
Size
420KB
-
Sample
221123-ad25gahc5y
-
MD5
241fce54b2ba9860c80dc4d71770c252
-
SHA1
f530737a14de53d538057e307f9b3cd53dde3e83
-
SHA256
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c
-
SHA512
21a4cd7fe2450421519a11f94e03b039c0abcb3626528d548f0a977fbcdd11a25a7a45c7d356729a12395282714ea289e24528157a7b5027b88fd2466830dbcc
-
SSDEEP
6144:efeyDOoDF8bnB+JVYCdcYvcA1k1Zde9XsDo4w0cEKbLFaEjflZJlfP+FPIvR:hJoZ4AAA8A1kdeFsDo48TLFa8/bn+Fe
Static task
static1
Behavioral task
behavioral1
Sample
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c
-
Size
420KB
-
MD5
241fce54b2ba9860c80dc4d71770c252
-
SHA1
f530737a14de53d538057e307f9b3cd53dde3e83
-
SHA256
cbab412d11a02618573c38c89c0d651450800e210599620d7d26f7c30210415c
-
SHA512
21a4cd7fe2450421519a11f94e03b039c0abcb3626528d548f0a977fbcdd11a25a7a45c7d356729a12395282714ea289e24528157a7b5027b88fd2466830dbcc
-
SSDEEP
6144:efeyDOoDF8bnB+JVYCdcYvcA1k1Zde9XsDo4w0cEKbLFaEjflZJlfP+FPIvR:hJoZ4AAA8A1kdeFsDo48TLFa8/bn+Fe
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-