General
-
Target
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
-
Size
1.4MB
-
Sample
221123-vzl1ladd41
-
MD5
e30c81f42a72512d32754e595e80e942
-
SHA1
fe665ba908128e59957ff756a6a7984a0f71b2c6
-
SHA256
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
-
SHA512
d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff
-
SSDEEP
24576:j0AZbveE+KiB7+AwKeAm8J7X32A66MisH+98OqoYaejLs13doYg7:vbveE+tyAwBAm8RXale980sjLMA7
Static task
static1
Behavioral task
behavioral1
Sample
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe
Resource
win7-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
general123
Targets
-
-
Target
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
-
Size
1.4MB
-
MD5
e30c81f42a72512d32754e595e80e942
-
SHA1
fe665ba908128e59957ff756a6a7984a0f71b2c6
-
SHA256
3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e
-
SHA512
d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff
-
SSDEEP
24576:j0AZbveE+KiB7+AwKeAm8J7X32A66MisH+98OqoYaejLs13doYg7:vbveE+tyAwBAm8RXale980sjLMA7
-
Modifies WinLogon for persistence
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-