General
-
Target
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012
-
Size
633KB
-
Sample
221125-hv7ehsdc81
-
MD5
bef5621e26ae25e61980a4ba625acc37
-
SHA1
e5d5aafc18c78d7c2e5c9572a3146148c260e6e5
-
SHA256
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012
-
SHA512
c6e7110da0b61146d2d3363401698259e404767d62eb281f1e877c3937521feb37157c2acaf09e210ace655cb96166e0347af3925dedb402bc882430e46fd29b
-
SSDEEP
12288:KCz6oYTQuFS8K8aRmGeqA64IGdUMpCiqFpShs+R6:PaYzA/aH
Static task
static1
Behavioral task
behavioral1
Sample
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012
-
Size
633KB
-
MD5
bef5621e26ae25e61980a4ba625acc37
-
SHA1
e5d5aafc18c78d7c2e5c9572a3146148c260e6e5
-
SHA256
cb3ee88ee9e3b3bfe4345ebefe26da3ff33efcc8409a2e5cd362e381d8c90012
-
SHA512
c6e7110da0b61146d2d3363401698259e404767d62eb281f1e877c3937521feb37157c2acaf09e210ace655cb96166e0347af3925dedb402bc882430e46fd29b
-
SSDEEP
12288:KCz6oYTQuFS8K8aRmGeqA64IGdUMpCiqFpShs+R6:PaYzA/aH
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-