General
-
Target
be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19
-
Size
573KB
-
Sample
221123-xbfj1she2t
-
MD5
e3f00a3c7e9f820c201fac1277374f88
-
SHA1
c55dec588d62c1178014f1e32819ea03d82217a2
-
SHA256
be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19
-
SHA512
7aea422b59f6006bbdeda5cf09aa3266d7b42cadc37273da04d286c8d643226af838a7d86ba02adb8c72eb6dd5d94dea6737d96f824e6b905800b45768466478
-
SSDEEP
6144:ar02OnZ0DAkTZ37sGCCeNknpDYNNQelGnFxbLDryboYd8BTi8voVO+Z:cY0DAkTZwGCCq8IEnjbvEryBTgk+
Static task
static1
Behavioral task
behavioral1
Sample
be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19.exe
Resource
win7-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
poczta.interia.pl - Port:
587 - Username:
[email protected] - Password:
qwerty123
Targets
-
-
Target
be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19
-
Size
573KB
-
MD5
e3f00a3c7e9f820c201fac1277374f88
-
SHA1
c55dec588d62c1178014f1e32819ea03d82217a2
-
SHA256
be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19
-
SHA512
7aea422b59f6006bbdeda5cf09aa3266d7b42cadc37273da04d286c8d643226af838a7d86ba02adb8c72eb6dd5d94dea6737d96f824e6b905800b45768466478
-
SSDEEP
6144:ar02OnZ0DAkTZ37sGCCeNknpDYNNQelGnFxbLDryboYd8BTi8voVO+Z:cY0DAkTZwGCCq8IEnjbvEryBTgk+
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-