General
-
Target
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938
-
Size
611KB
-
Sample
221124-ypvfrsac3z
-
MD5
ad47cfd40857dc7a8560e13a21446d3c
-
SHA1
95b8a713ff383777cebf0a5fb9b5bd78be9b3195
-
SHA256
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938
-
SHA512
b32fdf3cf8605d2766e427281ff908f954315d586b16383adc4aa22294f7800d4ff2cd8c9526b050489532f6da5a349fd8d041b71cc4cef4d3bca068a77dd5f8
-
SSDEEP
12288:ahJlg4a4SkSxK9CJnIv5eBMfUSOxwGCTRywJPc171VQQFy6Pu:WJta4SrsC1xMccGA7JUdAQF
Static task
static1
Behavioral task
behavioral1
Sample
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938
-
Size
611KB
-
MD5
ad47cfd40857dc7a8560e13a21446d3c
-
SHA1
95b8a713ff383777cebf0a5fb9b5bd78be9b3195
-
SHA256
bd97fa4a869e6abe3d7281da4732db2a1f6878925095aa0c23acd64ea99af938
-
SHA512
b32fdf3cf8605d2766e427281ff908f954315d586b16383adc4aa22294f7800d4ff2cd8c9526b050489532f6da5a349fd8d041b71cc4cef4d3bca068a77dd5f8
-
SSDEEP
12288:ahJlg4a4SkSxK9CJnIv5eBMfUSOxwGCTRywJPc171VQQFy6Pu:WJta4SrsC1xMccGA7JUdAQF
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-