General
-
Target
59c53813afac19d4a6439af414597d529dcf973c04ba99a94f40d2de8d7a51d1
-
Size
456KB
-
Sample
221127-qx9xesfb9v
-
MD5
90caac4f6cdbf7973a865dedf54255cd
-
SHA1
2b3deb23d17ec7dac24eb87d3b71788d55b89f59
-
SHA256
59c53813afac19d4a6439af414597d529dcf973c04ba99a94f40d2de8d7a51d1
-
SHA512
6fa9e0d81da84ee8a2b9d07ee8d9148758a36fe61429f7c284262ba4426c7ea1396f8abdbdacb23b95e55254d2db23a97f923ac2418a346dee2e75434793010b
-
SSDEEP
6144:xlkWyyvotlKtJrVtDsSC97H+vNzm7+ud+uZVAfGuPm59HeXQR1RsyLk6h3kcqkNy:Lkn66gjq9L+8Rqje+XQRTJg6Kc3w9
Static task
static1
Behavioral task
behavioral1
Sample
59c53813afac19d4a6439af414597d529dcf973c04ba99a94f40d2de8d7a51d1.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
59c53813afac19d4a6439af414597d529dcf973c04ba99a94f40d2de8d7a51d1
-
Size
456KB
-
MD5
90caac4f6cdbf7973a865dedf54255cd
-
SHA1
2b3deb23d17ec7dac24eb87d3b71788d55b89f59
-
SHA256
59c53813afac19d4a6439af414597d529dcf973c04ba99a94f40d2de8d7a51d1
-
SHA512
6fa9e0d81da84ee8a2b9d07ee8d9148758a36fe61429f7c284262ba4426c7ea1396f8abdbdacb23b95e55254d2db23a97f923ac2418a346dee2e75434793010b
-
SSDEEP
6144:xlkWyyvotlKtJrVtDsSC97H+vNzm7+ud+uZVAfGuPm59HeXQR1RsyLk6h3kcqkNy:Lkn66gjq9L+8Rqje+XQRTJg6Kc3w9
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-