General
-
Target
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57
-
Size
1.7MB
-
Sample
221125-ynfk8aed6x
-
MD5
5d1669834cdd22f483bab2d401ccf4c0
-
SHA1
d2c727ac48af942e453e3640f915a1cc5e251e61
-
SHA256
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57
-
SHA512
b1220da3c4371ef63c8411d285cbfbb8d5606660fa9f27015b8f3c476ea13ea70b7127f1e81bc135e1f2f39754df69f42e8a00754052c249f28d7ddf38ebb59f
-
SSDEEP
49152:2cBL9m2k8/FLOI1by009bR8bDAU0tlqyNCDWrqrDUus0:2QLMnOKI1G3bR8bkU0t9WZ
Static task
static1
Behavioral task
behavioral1
Sample
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.messagingengine.com - Port:
587 - Username:
[email protected] - Password:
qedrks8q9hlo8up1ao7hrljvc7
Targets
-
-
Target
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57
-
Size
1.7MB
-
MD5
5d1669834cdd22f483bab2d401ccf4c0
-
SHA1
d2c727ac48af942e453e3640f915a1cc5e251e61
-
SHA256
f295b28de8623176f5275556b2ee5a0ff48092bf71a3e1ea8f545f3332caaf57
-
SHA512
b1220da3c4371ef63c8411d285cbfbb8d5606660fa9f27015b8f3c476ea13ea70b7127f1e81bc135e1f2f39754df69f42e8a00754052c249f28d7ddf38ebb59f
-
SSDEEP
49152:2cBL9m2k8/FLOI1by009bR8bDAU0tlqyNCDWrqrDUus0:2QLMnOKI1G3bR8bkU0t9WZ
-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-