General
-
Target
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45
-
Size
534KB
-
Sample
221123-wkehmscc24
-
MD5
6cf997117bd62b14828a16f936b3ded7
-
SHA1
33ff7d5ae9747106eb238717872c504b6f2af8bb
-
SHA256
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45
-
SHA512
668fc8e52c08ff46c82854d20995cce2089b1bc3f033f33065b97e72a1fb90344957c76e9fb3d689dd50145df7981ed21725f1259187b0645dbb1838f7b64c1c
-
SSDEEP
6144:+uMqrUbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9l:QQtqB5urTIoYWBQk1E+VF9mOx9
Static task
static1
Behavioral task
behavioral1
Sample
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Maine123
Targets
-
-
Target
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45
-
Size
534KB
-
MD5
6cf997117bd62b14828a16f936b3ded7
-
SHA1
33ff7d5ae9747106eb238717872c504b6f2af8bb
-
SHA256
09baaa8878c86e0779f3e045362c7c5cc8a17e7980ddd7bc8b3b6e63c78c7d45
-
SHA512
668fc8e52c08ff46c82854d20995cce2089b1bc3f033f33065b97e72a1fb90344957c76e9fb3d689dd50145df7981ed21725f1259187b0645dbb1838f7b64c1c
-
SSDEEP
6144:+uMqrUbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9l:QQtqB5urTIoYWBQk1E+VF9mOx9
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-