General
-
Target
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696
-
Size
941KB
-
Sample
221128-e5y94seg85
-
MD5
ebb80fa33ac5c7f7d1b345ed4bb483fa
-
SHA1
bcc39da1895763088edc3e8c45e30d646f6c2802
-
SHA256
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696
-
SHA512
4ee465ac24909b8ade11e61f2e15d898f0aec84268cae90719cae250abf62852e09c45914602c8509a7cce6300e8e32f437d0f595aee986879d750afdb2aeff4
-
SSDEEP
24576:K1L/RH37hRlZa2gnYfv+9/DD83LEL9dhmxRw3/:K1bF3tRDa2aYfv+9rMLm3+w3
Static task
static1
Behavioral task
behavioral1
Sample
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
91.235.138.178 - Port:
587 - Username:
[email protected] - Password:
@yahoo.coM
Targets
-
-
Target
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696
-
Size
941KB
-
MD5
ebb80fa33ac5c7f7d1b345ed4bb483fa
-
SHA1
bcc39da1895763088edc3e8c45e30d646f6c2802
-
SHA256
e6b2ea851cc6e13831c4aeec7385ac3358c3971be9accc567936a56c133a4696
-
SHA512
4ee465ac24909b8ade11e61f2e15d898f0aec84268cae90719cae250abf62852e09c45914602c8509a7cce6300e8e32f437d0f595aee986879d750afdb2aeff4
-
SSDEEP
24576:K1L/RH37hRlZa2gnYfv+9/DD83LEL9dhmxRw3/:K1bF3tRDa2aYfv+9rMLm3+w3
-
Modifies WinLogon for persistence
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-