General
-
Target
eda7b859444c7e2308b041a2bf6401d8a3e1e301e7fb8ba3062e29057559bad3
-
Size
1.5MB
-
Sample
221126-nevnnsdh4x
-
MD5
ce542fe492754f16876fa41ad555212c
-
SHA1
78fef1b76ec6cb34359e01987ff02cc463dda70a
-
SHA256
eda7b859444c7e2308b041a2bf6401d8a3e1e301e7fb8ba3062e29057559bad3
-
SHA512
5886acbb05b1dae404068ab26277f0c6f2d5d320ef7f4bd42c4886b61bbdec2c1215addda9a829dd2d93dd5d002765c4ca4b1396757f86057aa3ebe0eadd9d84
-
SSDEEP
24576:viZDrjF7kaA2THUVw0OdguwVxR4h2hlbVpPnxzyj7ngeWMBr6rQs89roc5m:6ZrJzTTHoOGplaepQngebd/9Mb
Static task
static1
Behavioral task
behavioral1
Sample
eda7b859444c7e2308b041a2bf6401d8a3e1e301e7fb8ba3062e29057559bad3.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
eda7b859444c7e2308b041a2bf6401d8a3e1e301e7fb8ba3062e29057559bad3
-
Size
1.5MB
-
MD5
ce542fe492754f16876fa41ad555212c
-
SHA1
78fef1b76ec6cb34359e01987ff02cc463dda70a
-
SHA256
eda7b859444c7e2308b041a2bf6401d8a3e1e301e7fb8ba3062e29057559bad3
-
SHA512
5886acbb05b1dae404068ab26277f0c6f2d5d320ef7f4bd42c4886b61bbdec2c1215addda9a829dd2d93dd5d002765c4ca4b1396757f86057aa3ebe0eadd9d84
-
SSDEEP
24576:viZDrjF7kaA2THUVw0OdguwVxR4h2hlbVpPnxzyj7ngeWMBr6rQs89roc5m:6ZrJzTTHoOGplaepQngebd/9Mb
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-