General
-
Target
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2
-
Size
445KB
-
Sample
221127-km1ccagh4v
-
MD5
46188804e5e27e33dc013211b9f285dd
-
SHA1
04639d4398385f9e9621eb1e764b5516a401302c
-
SHA256
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2
-
SHA512
7fd50e3c07240518189d34c74c9ed06b078ef421500d3b310678254aaaec077c3268796e3988407929feab8b1e010e688b625480a9442d9501f74497d7f44af5
-
SSDEEP
6144:U9lZdcXl0nwu76hqQN97gtpfSy5HzLnjXRcp1kshRNvaJ0OiGRTJLeRkxnb:+O0wi6JN1wfl5TLTRcjksMliGNReRkt
Static task
static1
Behavioral task
behavioral1
Sample
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2
-
Size
445KB
-
MD5
46188804e5e27e33dc013211b9f285dd
-
SHA1
04639d4398385f9e9621eb1e764b5516a401302c
-
SHA256
53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2
-
SHA512
7fd50e3c07240518189d34c74c9ed06b078ef421500d3b310678254aaaec077c3268796e3988407929feab8b1e010e688b625480a9442d9501f74497d7f44af5
-
SSDEEP
6144:U9lZdcXl0nwu76hqQN97gtpfSy5HzLnjXRcp1kshRNvaJ0OiGRTJLeRkxnb:+O0wi6JN1wfl5TLTRcjksMliGNReRkt
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-