General
-
Target
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7
-
Size
862KB
-
Sample
221123-l2lm6sgc2s
-
MD5
a825e6d2fdc7fb2f4b094f66f14827a5
-
SHA1
030bf2d57e5b39e837d990f056775765e1e6646d
-
SHA256
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7
-
SHA512
ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38
-
SSDEEP
12288:njue1nWr9iA/JFv0c3Um3eLSJk9KqjC1u6MXCITIFI3NlAaiSQu8G:x9WrRum3WjqFU
Static task
static1
Behavioral task
behavioral1
Sample
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7
-
Size
862KB
-
MD5
a825e6d2fdc7fb2f4b094f66f14827a5
-
SHA1
030bf2d57e5b39e837d990f056775765e1e6646d
-
SHA256
77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7
-
SHA512
ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38
-
SSDEEP
12288:njue1nWr9iA/JFv0c3Um3eLSJk9KqjC1u6MXCITIFI3NlAaiSQu8G:x9WrRum3WjqFU
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-