General
-
Target
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
-
Size
407KB
-
Sample
221123-tx551sad7w
-
MD5
98518cfa1ad6fb3be1bcd3ba5fd0847d
-
SHA1
ba6e43ad2bbc0ac1da8e2063649e86ffcbcd6e26
-
SHA256
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
-
SHA512
bdede47ac2ba4a17aa62a0aa7452e966428ce0a98456ef138a5170da710fc9664a8b4f31410d92edb98b99887569bb5d6e9b93e539c988ada3a7203187e4df79
-
SSDEEP
6144:NbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihCj:NQtqB5urTIoYWBQkv
Static task
static1
Behavioral task
behavioral1
Sample
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe
Resource
win7-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hruabfostiabgdjq
Targets
-
-
Target
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
-
Size
407KB
-
MD5
98518cfa1ad6fb3be1bcd3ba5fd0847d
-
SHA1
ba6e43ad2bbc0ac1da8e2063649e86ffcbcd6e26
-
SHA256
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
-
SHA512
bdede47ac2ba4a17aa62a0aa7452e966428ce0a98456ef138a5170da710fc9664a8b4f31410d92edb98b99887569bb5d6e9b93e539c988ada3a7203187e4df79
-
SSDEEP
6144:NbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihCj:NQtqB5urTIoYWBQkv
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-