General
-
Target
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17
-
Size
445KB
-
Sample
221125-phgrnaga64
-
MD5
660d0e54b6ba5a5ea3a6de8180f319ad
-
SHA1
0051f49583abd91919ee46cd91377483d51ee7d3
-
SHA256
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17
-
SHA512
ccc61ad3a55f41f7b4c3f54bb84d243bbcab71a082f109ffbf234c37a84a63d16632ea1f86cc101554d3199d3e5334dff980207eb3190ebd496f3d52b1908e1a
-
SSDEEP
12288:h/vZwod3VzlRuM3umMwIWrBZgAax/Y5lZ:h/Ood9lU8vIWlchYLZ
Static task
static1
Behavioral task
behavioral1
Sample
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17
-
Size
445KB
-
MD5
660d0e54b6ba5a5ea3a6de8180f319ad
-
SHA1
0051f49583abd91919ee46cd91377483d51ee7d3
-
SHA256
97f3bba0af518302b6aebef50d4006e8a13bc172103c543ff6b801be4cefcf17
-
SHA512
ccc61ad3a55f41f7b4c3f54bb84d243bbcab71a082f109ffbf234c37a84a63d16632ea1f86cc101554d3199d3e5334dff980207eb3190ebd496f3d52b1908e1a
-
SSDEEP
12288:h/vZwod3VzlRuM3umMwIWrBZgAax/Y5lZ:h/Ood9lU8vIWlchYLZ
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-