General
-
Target
61871ec9318c676deb9f4333087795ff894a6bfbd0daca8ba9941973e1c40954
-
Size
702KB
-
Sample
221126-kk4xraaa9x
-
MD5
0641304ec5d9ba1e270767d8dfdcc6a9
-
SHA1
18d410355448ed47a627211db84680e1ca772a2a
-
SHA256
61871ec9318c676deb9f4333087795ff894a6bfbd0daca8ba9941973e1c40954
-
SHA512
eee9291b544af2300019b285fa6da38134a93bd0a9a4a576a04bcd6531a954e2dc8f97bdbfeb748093744d7cbd4b688d4a2430dc876efa47b83bf71ac364de20
-
SSDEEP
12288:uHEKS3ZLrYWDxGo7PeEhEvIKX6Innpd6D6tnpekJz43:ukKS3ZLzNzUvIKDpd3tnpekJzw
Static task
static1
Behavioral task
behavioral1
Sample
61871ec9318c676deb9f4333087795ff894a6bfbd0daca8ba9941973e1c40954.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
61871ec9318c676deb9f4333087795ff894a6bfbd0daca8ba9941973e1c40954
-
Size
702KB
-
MD5
0641304ec5d9ba1e270767d8dfdcc6a9
-
SHA1
18d410355448ed47a627211db84680e1ca772a2a
-
SHA256
61871ec9318c676deb9f4333087795ff894a6bfbd0daca8ba9941973e1c40954
-
SHA512
eee9291b544af2300019b285fa6da38134a93bd0a9a4a576a04bcd6531a954e2dc8f97bdbfeb748093744d7cbd4b688d4a2430dc876efa47b83bf71ac364de20
-
SSDEEP
12288:uHEKS3ZLrYWDxGo7PeEhEvIKX6Innpd6D6tnpekJz43:ukKS3ZLzNzUvIKDpd3tnpekJzw
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-