General
-
Target
07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b
-
Size
1.0MB
-
Sample
221126-qsxfjafh43
-
MD5
0d3ded48db36dab61e96359a41e86419
-
SHA1
df7825bfa9e0721aff777bd3f4786afe8a35dc68
-
SHA256
07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b
-
SHA512
14eefc8672304b7bd77f1a03d3d48857ca21909a55f1c9fe7eaa23be2c6bf332691793a0f24d0c0b1e4cfdb820106a2c6d2e22168768661a7618bb3dbc08cb3c
-
SSDEEP
24576:bI1xoQrUbqJd1G8CX4KnMseCuwBVA0mqG0sLi:UzrsxNT0W+0mw
Static task
static1
Behavioral task
behavioral1
Sample
07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b.exe
Resource
win7-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.mattroy.com - Port:
587 - Username:
[email protected] - Password:
N!ssan7a
Targets
-
-
Target
07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b
-
Size
1.0MB
-
MD5
0d3ded48db36dab61e96359a41e86419
-
SHA1
df7825bfa9e0721aff777bd3f4786afe8a35dc68
-
SHA256
07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b
-
SHA512
14eefc8672304b7bd77f1a03d3d48857ca21909a55f1c9fe7eaa23be2c6bf332691793a0f24d0c0b1e4cfdb820106a2c6d2e22168768661a7618bb3dbc08cb3c
-
SSDEEP
24576:bI1xoQrUbqJd1G8CX4KnMseCuwBVA0mqG0sLi:UzrsxNT0W+0mw
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-