General
-
Target
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86
-
Size
619KB
-
Sample
221123-xaj6taed42
-
MD5
055e822885e9b0971b4e87b0ebfa4ab6
-
SHA1
c23f1fe682b87478bd3e327dd499960adf412aef
-
SHA256
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86
-
SHA512
85fe528df5975ef29fb794f99a91dc9d0fab665c4fd8bc923f7a980ddefff00696441343c0684db1ad8894830d5c2f538b5fce3420520318c149a33ae5035afe
-
SSDEEP
12288:YkA5CuXTZVMUX8+fdS+D3niMcH+GjXyNrZWsg:Y15CuDZVMethD3i9HVXU9g
Static task
static1
Behavioral task
behavioral1
Sample
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86
-
Size
619KB
-
MD5
055e822885e9b0971b4e87b0ebfa4ab6
-
SHA1
c23f1fe682b87478bd3e327dd499960adf412aef
-
SHA256
3ceef80c3de4e08f798a9d3a958da20cd1790a06e55a8805053f51a004b83d86
-
SHA512
85fe528df5975ef29fb794f99a91dc9d0fab665c4fd8bc923f7a980ddefff00696441343c0684db1ad8894830d5c2f538b5fce3420520318c149a33ae5035afe
-
SSDEEP
12288:YkA5CuXTZVMUX8+fdS+D3niMcH+GjXyNrZWsg:Y15CuDZVMethD3i9HVXU9g
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-