General
-
Target
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2
-
Size
765KB
-
Sample
221124-pjwl7sgc2w
-
MD5
f4b4e586e4327b72c9d3df291dd2e2a8
-
SHA1
7be13087455a339a0a357c4c17c22eaf52a7af5e
-
SHA256
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2
-
SHA512
cef2bc0014273bbcdc77c9b0222c029e77cf21a3b1984de8cae3fef7aee9f482fbf72d9e8f5856ffe97f9e4e22ca19a92d20f4334eb3ce21deda19e294448195
-
SSDEEP
12288:c/n0wCLO6f8vSdam2+8AZUOuu67Ey72r6W06d0FfvWmLRSsy95K:cf05LhKfLnEy7LRaiWmLRw
Static task
static1
Behavioral task
behavioral1
Sample
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
PPOPP123
Targets
-
-
Target
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2
-
Size
765KB
-
MD5
f4b4e586e4327b72c9d3df291dd2e2a8
-
SHA1
7be13087455a339a0a357c4c17c22eaf52a7af5e
-
SHA256
7bd2001eb7de153c2624498421dacb9fa01f6bf65fc0aa823c95656d92d07aa2
-
SHA512
cef2bc0014273bbcdc77c9b0222c029e77cf21a3b1984de8cae3fef7aee9f482fbf72d9e8f5856ffe97f9e4e22ca19a92d20f4334eb3ce21deda19e294448195
-
SSDEEP
12288:c/n0wCLO6f8vSdam2+8AZUOuu67Ey72r6W06d0FfvWmLRSsy95K:cf05LhKfLnEy7LRaiWmLRw
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-