General
-
Target
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23
-
Size
683KB
-
Sample
221123-pt42bsfd4t
-
MD5
17f7cfa9c9395006257d6aea2883ff21
-
SHA1
f4a4f1d274f88d52c864fd5ea5da50cb7b048416
-
SHA256
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23
-
SHA512
b952233c8e055b5b657c84d8616e46b75a5537853202d00e97ddb01de63207e99083238c9bcb3ae0d69dbd0ce3b17c6c3a149b291bb690844f6ffb81729e64b5
-
SSDEEP
12288:E4lzOMoINMD0kAYRRT+ZohrImUMHGqrnlVbz5KNM1cD4tvVOpp:lObD0kfTsoBImUiGClxsNqcD4tNOr
Static task
static1
Behavioral task
behavioral1
Sample
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
mijicledwhdsszyu
Targets
-
-
Target
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23
-
Size
683KB
-
MD5
17f7cfa9c9395006257d6aea2883ff21
-
SHA1
f4a4f1d274f88d52c864fd5ea5da50cb7b048416
-
SHA256
fb4539da92869ddeffe519366c6fb65b6e9198ccd782a65cce8ea6e6cb991b23
-
SHA512
b952233c8e055b5b657c84d8616e46b75a5537853202d00e97ddb01de63207e99083238c9bcb3ae0d69dbd0ce3b17c6c3a149b291bb690844f6ffb81729e64b5
-
SSDEEP
12288:E4lzOMoINMD0kAYRRT+ZohrImUMHGqrnlVbz5KNM1cD4tvVOpp:lObD0kfTsoBImUiGClxsNqcD4tNOr
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-