General
-
Target
590c7796e1c5f3d371350e97ae155b9655acd590228ee4eeb573eb6f3dd13018
-
Size
622KB
-
Sample
221126-fee9zscg32
-
MD5
d341f1543175c67eafe196ae4f4c180f
-
SHA1
89fa5568c3272450cb7c702deff000d80d7ddf45
-
SHA256
590c7796e1c5f3d371350e97ae155b9655acd590228ee4eeb573eb6f3dd13018
-
SHA512
1c45d0f92f5faa5522c637c77b0c9ce5bdf72b00098ba8bd31bddeed0251294274822682e8f7f94ad07d6998cf0987bb3d8cff03fd00fe2dd84aa1d9a890c811
-
SSDEEP
12288:OyfqlLzfU2n5hSl4JiQXd+l1dX6Vu9EV27zmIZeSu34:Oyf8865h4nQe1dKwitiruo
Behavioral task
behavioral1
Sample
Pc2dialer.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Pc2dialer.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
pc2phone.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
pc2phone.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
Pc2dialer.exe
-
Size
487KB
-
MD5
3399a53d376910e796dfc7c24e8d506f
-
SHA1
4ddfc8cd02d72c1f022d38d7c2b6bfff87491592
-
SHA256
ff2079bee75cb84494ae4b39a2cba2654cddd8498cbee9cba4f925362653cba1
-
SHA512
6fd68386e72ab0f96d6322024c8bc79238cae2fd8c2377f23ed217d8fe1f756a6f09c95dbba45741013e718d1d0013c9daa19be0f0a3fb50366cc361fff53b52
-
SSDEEP
12288:yik5diJd83cpvevhSS4byNZMmtupNXbB18hePoY5L9FJZjWXFyF:yi2ij2MOSFTmtupNrB13AoL9FXyXFyF
Score8/10 -
-
-
Target
pc2phone.exe
-
Size
196KB
-
MD5
c3f8f8e4390dbeeae12c7b86c767122d
-
SHA1
a3f385fa227e4266e330d919e943b4b91f70dad3
-
SHA256
23fe6dd586cb5ecf3a5603c0475bbe55d088fbba7a4718c8f05590459e97c413
-
SHA512
9a6d26cbb0ef04aa92c4fb26cfff571c17b1d4c7db7f8c83a7cb958290e0ad26ffe04df380940c33fdadd476a0a4514cb62322972a292abeb2a0fc2c0c9dd61f
-
SSDEEP
3072:Azi7eCYDnulWznEbiwx91gZbv5vTL38JGCAmUPCF2NHzVAeyr3mII0b4Fi:n7eCYLud0bhLYUqANJkr3F40
Score6/10-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-