General
-
Target
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934
-
Size
663KB
-
Sample
221123-thjngaeb49
-
MD5
6b44529aac09330b1516899cc4010680
-
SHA1
1fd8a3277ff6ed227e6523e2f21f6d1e426656b6
-
SHA256
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934
-
SHA512
fb82652a9115d9b6906a4578ea88485d690c40eb403856db5525529a3bd3661f895d1b710b85413d000a5e3a0ce4274ce80f631f0300cedc5dd9f279d59ef9a6
-
SSDEEP
12288:tm5wt9Y6zFxVngi8hRDK6YevoXSG8iG9a+rZeUbCq:jtJpLngik9aYeUbCq
Static task
static1
Behavioral task
behavioral1
Sample
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
mynameiswhat
Targets
-
-
Target
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934
-
Size
663KB
-
MD5
6b44529aac09330b1516899cc4010680
-
SHA1
1fd8a3277ff6ed227e6523e2f21f6d1e426656b6
-
SHA256
bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934
-
SHA512
fb82652a9115d9b6906a4578ea88485d690c40eb403856db5525529a3bd3661f895d1b710b85413d000a5e3a0ce4274ce80f631f0300cedc5dd9f279d59ef9a6
-
SSDEEP
12288:tm5wt9Y6zFxVngi8hRDK6YevoXSG8iG9a+rZeUbCq:jtJpLngik9aYeUbCq
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-