General
-
Target
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71
-
Size
599KB
-
Sample
221123-rnrj6acb2w
-
MD5
0ed69f6721bf840229ae0b11eb0328d3
-
SHA1
60630b72a437df017f9a938afda7b4e53914fd2f
-
SHA256
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71
-
SHA512
2e220b763010e4d443aba63b0b405f92da5c703e5b18c1041b4380b3af48b1f7437cd4735cbc246e573bd4714afb9103b533f4f6b8639ba8a156a83f98c37abe
-
SSDEEP
6144:KrbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9XHzzoR:WQtqB5urTIoYWBQk1E+VF9mOx9jq
Static task
static1
Behavioral task
behavioral1
Sample
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71
-
Size
599KB
-
MD5
0ed69f6721bf840229ae0b11eb0328d3
-
SHA1
60630b72a437df017f9a938afda7b4e53914fd2f
-
SHA256
508ceb298d34600cbb7cdf117ef1e655978671f920b3d9a142a1d5ef33a0ab71
-
SHA512
2e220b763010e4d443aba63b0b405f92da5c703e5b18c1041b4380b3af48b1f7437cd4735cbc246e573bd4714afb9103b533f4f6b8639ba8a156a83f98c37abe
-
SSDEEP
6144:KrbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9XHzzoR:WQtqB5urTIoYWBQk1E+VF9mOx9jq
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-