General
-
Target
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097
-
Size
4.2MB
-
Sample
221128-e6rawseh39
-
MD5
0fceb8d2c081bbc44857aa5691040515
-
SHA1
23fd85edd4bcb9b9e6ddb14dc8e2965380aa5783
-
SHA256
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097
-
SHA512
3348bdfd23a695a4ffa65ba8cfd09ff4d85922236521eddc846bfcf33041db78056e35c43aa83ea799120a7fa60c203320b6b93354e723bb6f58b903f1854b3f
-
SSDEEP
49152:OK35iAwrepqkeke4UdDF2EwuYn8yaIb5aVieEjhK5D6bIi84yxba82qwX2Di9xoy:OK3QAwU7e4ElQJZ+9hIyjwGu9OBqTfiC
Static task
static1
Behavioral task
behavioral1
Sample
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.freehostia.com - Port:
21 - Username:
benowe4 - Password:
jerry004
Targets
-
-
Target
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097
-
Size
4.2MB
-
MD5
0fceb8d2c081bbc44857aa5691040515
-
SHA1
23fd85edd4bcb9b9e6ddb14dc8e2965380aa5783
-
SHA256
aa3441ea0d98de567a55639ec78f0e617526894f0a437726249ad40a0ae0e097
-
SHA512
3348bdfd23a695a4ffa65ba8cfd09ff4d85922236521eddc846bfcf33041db78056e35c43aa83ea799120a7fa60c203320b6b93354e723bb6f58b903f1854b3f
-
SSDEEP
49152:OK35iAwrepqkeke4UdDF2EwuYn8yaIb5aVieEjhK5D6bIi84yxba82qwX2Di9xoy:OK3QAwU7e4ElQJZ+9hIyjwGu9OBqTfiC
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-