General
-
Target
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a
-
Size
502KB
-
Sample
221125-ddewqaff57
-
MD5
849e250bf6b07de0fc59385ab77a72e8
-
SHA1
5fd880f856e032e0f654899475df242c0bb9ab34
-
SHA256
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a
-
SHA512
6e9efb493871f8cd98b5bf46b02b91278a391040cae0803925e5d07306fcb73ebb4e54cf5149ccca297952284e78e3e3baccce0808be9d34b262b5638a5daf87
-
SSDEEP
6144:grLbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHL:grLQtqB5urTIoYWBQk1E+VF9mOx9n
Static task
static1
Behavioral task
behavioral1
Sample
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a
-
Size
502KB
-
MD5
849e250bf6b07de0fc59385ab77a72e8
-
SHA1
5fd880f856e032e0f654899475df242c0bb9ab34
-
SHA256
3664f5cd6a12e7543518a0b62111664a9ddf70d54d10aed0c697910565984b8a
-
SHA512
6e9efb493871f8cd98b5bf46b02b91278a391040cae0803925e5d07306fcb73ebb4e54cf5149ccca297952284e78e3e3baccce0808be9d34b262b5638a5daf87
-
SSDEEP
6144:grLbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHL:grLQtqB5urTIoYWBQk1E+VF9mOx9n
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-