General
-
Target
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a
-
Size
631KB
-
Sample
221123-res2magd76
-
MD5
92637dac36581dc6e25630335adffd0c
-
SHA1
921d8e21ccd454f1d86c0e65646e4bb9fa81dad6
-
SHA256
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a
-
SHA512
0c455098dfc0cfcce0c01859ffe606aa78b13d48e1514b7edc91cfdaa08f08808a3f5dbf0ce38a6e446257cfc001986f6df8779db47ff71094249e2f070c9870
-
SSDEEP
12288:REa0JADcUGWK7vzU1Ozs8bUYvmvMv1FUDwC1LkN3+7HhXyy30kg:Rhq/nU4Qigo1k1s+7BXy
Static task
static1
Behavioral task
behavioral1
Sample
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a
-
Size
631KB
-
MD5
92637dac36581dc6e25630335adffd0c
-
SHA1
921d8e21ccd454f1d86c0e65646e4bb9fa81dad6
-
SHA256
66bb0bb393cc6532e5bab56a2aa581215b85edd0e2402361138e3d9bf89cda4a
-
SHA512
0c455098dfc0cfcce0c01859ffe606aa78b13d48e1514b7edc91cfdaa08f08808a3f5dbf0ce38a6e446257cfc001986f6df8779db47ff71094249e2f070c9870
-
SSDEEP
12288:REa0JADcUGWK7vzU1Ozs8bUYvmvMv1FUDwC1LkN3+7HhXyy30kg:Rhq/nU4Qigo1k1s+7BXy
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-