General
-
Target
f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6
-
Size
1.0MB
-
Sample
221126-kkj8caaa8s
-
MD5
fe1df217cd9801646ae835277835ce90
-
SHA1
9574dc64370a6e4921dfefcbe1e96f578c1a7b46
-
SHA256
f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6
-
SHA512
2a3f3daab18ebee123927ffdbbf4894b618227c3c2cf626a5e18e18f421a6acec68d17946ae79bd06cab34fd9f2eb3d3f02273816760f582fcd3556f21bae10c
-
SSDEEP
24576:+1jWWBXw6JlaAmq+ptL170MxkA+P37ESA48vx2QvaDxSC+cz:+ZbA6Jl831YMxkAswSGixSC+
Static task
static1
Behavioral task
behavioral1
Sample
f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6.exe
Resource
win7-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.mattroy.com - Port:
587 - Username:
[email protected] - Password:
N!ssan7a
Targets
-
-
Target
f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6
-
Size
1.0MB
-
MD5
fe1df217cd9801646ae835277835ce90
-
SHA1
9574dc64370a6e4921dfefcbe1e96f578c1a7b46
-
SHA256
f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6
-
SHA512
2a3f3daab18ebee123927ffdbbf4894b618227c3c2cf626a5e18e18f421a6acec68d17946ae79bd06cab34fd9f2eb3d3f02273816760f582fcd3556f21bae10c
-
SSDEEP
24576:+1jWWBXw6JlaAmq+ptL170MxkA+P37ESA48vx2QvaDxSC+cz:+ZbA6Jl831YMxkAswSGixSC+
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-