General
-
Target
2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc
-
Size
611KB
-
Sample
221125-dv4leagf78
-
MD5
a0716591cb79d1c96d07bf5530d29d1f
-
SHA1
ca0fbb0bd53ebdc0631746c4573efe13b8e6e3f9
-
SHA256
2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc
-
SHA512
70c8087ca945d5397cb32d900b2ebbb13f9597eb4fd1fdf56e7e641b89a99abc5c62a300445c4c2cc93fec0094fa3e074137dff1d45b2f8b3458b8494f95e5cf
-
SSDEEP
12288:mEfAqgMDfdo1mblW2aZAfBCAVs1qW1C0ktajPnGshbn6Pu:mEtDflWofoAC1qW3Ny
Static task
static1
Behavioral task
behavioral1
Sample
2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc
-
Size
611KB
-
MD5
a0716591cb79d1c96d07bf5530d29d1f
-
SHA1
ca0fbb0bd53ebdc0631746c4573efe13b8e6e3f9
-
SHA256
2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc
-
SHA512
70c8087ca945d5397cb32d900b2ebbb13f9597eb4fd1fdf56e7e641b89a99abc5c62a300445c4c2cc93fec0094fa3e074137dff1d45b2f8b3458b8494f95e5cf
-
SSDEEP
12288:mEfAqgMDfdo1mblW2aZAfBCAVs1qW1C0ktajPnGshbn6Pu:mEtDflWofoAC1qW3Ny
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-