General
-
Target
af0bb975d183df9888e786141eeb29d3bebb2bb34da2b6324605faae1da767eb
-
Size
2.1MB
-
Sample
221126-nyrq5aef6x
-
MD5
a403cc83cd027279a658cc0ae6db995f
-
SHA1
68bed9cbfa0f622bf43d5e3e69a16a54fc1439d4
-
SHA256
af0bb975d183df9888e786141eeb29d3bebb2bb34da2b6324605faae1da767eb
-
SHA512
b4951cd5789dbe9dd6f66ed975b3c41864430460b58285560a5284307db2432ab01d56816519f700ec9cafe01496764522199fb680ba0d91c0c989ba95e7a0bc
-
SSDEEP
49152:ckwkn9IMHeaOEZvUDZ7+Ml4O7106OpeDJtDSX01v3M/wGC1nAaPCS:XdnVrUDYMl4O710xAxv3CwGCdPC
Static task
static1
Behavioral task
behavioral1
Sample
af0bb975d183df9888e786141eeb29d3bebb2bb34da2b6324605faae1da767eb.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
af0bb975d183df9888e786141eeb29d3bebb2bb34da2b6324605faae1da767eb
-
Size
2.1MB
-
MD5
a403cc83cd027279a658cc0ae6db995f
-
SHA1
68bed9cbfa0f622bf43d5e3e69a16a54fc1439d4
-
SHA256
af0bb975d183df9888e786141eeb29d3bebb2bb34da2b6324605faae1da767eb
-
SHA512
b4951cd5789dbe9dd6f66ed975b3c41864430460b58285560a5284307db2432ab01d56816519f700ec9cafe01496764522199fb680ba0d91c0c989ba95e7a0bc
-
SSDEEP
49152:ckwkn9IMHeaOEZvUDZ7+Ml4O7106OpeDJtDSX01v3M/wGC1nAaPCS:XdnVrUDYMl4O710xAxv3CwGCdPC
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-