General
-
Target
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9
-
Size
630KB
-
Sample
221123-p8vq7sgd4s
-
MD5
fd3d9cb2162ced9d29e7e4de9e16007c
-
SHA1
88ec4fea49fcf905a24aabf3150c03e7f0643994
-
SHA256
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9
-
SHA512
a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8
-
SSDEEP
12288:Kkw7gYZ4+Rutkdy2oqvdT406LGrkGE4Qiujc+0BjgiD:pw7pXktkHT40BFE77FGjg
Static task
static1
Behavioral task
behavioral1
Sample
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
glfjdvzcsbfwvmtr
Targets
-
-
Target
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9
-
Size
630KB
-
MD5
fd3d9cb2162ced9d29e7e4de9e16007c
-
SHA1
88ec4fea49fcf905a24aabf3150c03e7f0643994
-
SHA256
d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9
-
SHA512
a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8
-
SSDEEP
12288:Kkw7gYZ4+Rutkdy2oqvdT406LGrkGE4Qiujc+0BjgiD:pw7pXktkHT40BFE77FGjg
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-