General
-
Target
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d
-
Size
682KB
-
Sample
221123-qym42sac3x
-
MD5
c99d06945050e18f35ba030f20b1eb9c
-
SHA1
94c567890f10035218e1bde09024d129ddde1e8a
-
SHA256
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d
-
SHA512
24ef40d0c7055f9dee19131adbe0eb49c2d4b8587942f6da7753e4aeadf2aedc2e0d50cba3828b909fd3524c1fb61b46b64bb4ea311af61345aebf5d376b3308
-
SSDEEP
12288:nrwPlHf28z6sKXf9T5ihfjWRfhMbRVxEoC1rXp4tvVOp:rwRf28zXC9TgckNnE4tNO
Static task
static1
Behavioral task
behavioral1
Sample
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
noohkxueuadadesg
Targets
-
-
Target
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d
-
Size
682KB
-
MD5
c99d06945050e18f35ba030f20b1eb9c
-
SHA1
94c567890f10035218e1bde09024d129ddde1e8a
-
SHA256
90db4e094f107397b4ff9453b834895ad1d3dae909b47726f17a31fd39367b6d
-
SHA512
24ef40d0c7055f9dee19131adbe0eb49c2d4b8587942f6da7753e4aeadf2aedc2e0d50cba3828b909fd3524c1fb61b46b64bb4ea311af61345aebf5d376b3308
-
SSDEEP
12288:nrwPlHf28z6sKXf9T5ihfjWRfhMbRVxEoC1rXp4tvVOp:rwRf28zXC9TgckNnE4tNO
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-