General
-
Target
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db
-
Size
618KB
-
Sample
221123-q1m7tsfd25
-
MD5
0d59c5c5ab73017146054c4a6e8baa68
-
SHA1
1b53f22c5c446733a30dbfb3b3006d27445d3b84
-
SHA256
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db
-
SHA512
b6f2ecb61d84cf7229eb4d9aa8e26d358a59c922cccce1e868b16bcea5ae5843301f2fb7c85f8e2ed04d477d01dab37b7088bcaa936ee3413106480490ac615f
-
SSDEEP
12288:ZLPZ3iFntfXoM5kfS067F1uLRKLXkoRHeU9f+iywXWtLhDCDZAAwp:b3yntzCfUpcLRk06eqBa9CDZAAwp
Static task
static1
Behavioral task
behavioral1
Sample
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db
-
Size
618KB
-
MD5
0d59c5c5ab73017146054c4a6e8baa68
-
SHA1
1b53f22c5c446733a30dbfb3b3006d27445d3b84
-
SHA256
8af01645a0b49a14a5659ddddad8dd28e55eb33c43bb5503530c5e72515ac5db
-
SHA512
b6f2ecb61d84cf7229eb4d9aa8e26d358a59c922cccce1e868b16bcea5ae5843301f2fb7c85f8e2ed04d477d01dab37b7088bcaa936ee3413106480490ac615f
-
SSDEEP
12288:ZLPZ3iFntfXoM5kfS067F1uLRKLXkoRHeU9f+iywXWtLhDCDZAAwp:b3yntzCfUpcLRk06eqBa9CDZAAwp
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-