General
-
Target
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214
-
Size
1.2MB
-
Sample
221126-ra4ybscd5y
-
MD5
d60d342c872960e239fc21a6785cb23e
-
SHA1
b2208b51a0cce67409c0b177f411b7ba6759a0ea
-
SHA256
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214
-
SHA512
74bb867bbe785076cdf320fc7dc0835e6e94c5b4a3cc74696ba96a1632b9064cdc02e62caf8117ce156bdd2bfb14b51862ae8fb23c5b3c3ddb27322b4e1f81c8
-
SSDEEP
24576:m3XTLC8OesJvIy112r6iiLoGmuP6cHsiK9GkUddebsVp3vmQfIL2ntbyEwxstM6o:mzQzJvIyL269mi66JXvmRL2nyxstM6D0
Static task
static1
Behavioral task
behavioral1
Sample
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
mocxcefaktgkceun
Targets
-
-
Target
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214
-
Size
1.2MB
-
MD5
d60d342c872960e239fc21a6785cb23e
-
SHA1
b2208b51a0cce67409c0b177f411b7ba6759a0ea
-
SHA256
a447a05c3519b7716ca64524bec450c2fc0402c503abb901b18cfb076aa36214
-
SHA512
74bb867bbe785076cdf320fc7dc0835e6e94c5b4a3cc74696ba96a1632b9064cdc02e62caf8117ce156bdd2bfb14b51862ae8fb23c5b3c3ddb27322b4e1f81c8
-
SSDEEP
24576:m3XTLC8OesJvIy112r6iiLoGmuP6cHsiK9GkUddebsVp3vmQfIL2ntbyEwxstM6o:mzQzJvIyL269mi66JXvmRL2nyxstM6D0
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-