General
-
Target
11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233
-
Size
1.4MB
-
Sample
221128-g94rhacd64
-
MD5
eefdc3d8d051270b7b1ff4d98ce61422
-
SHA1
20bdb8aa5899a34e6430ef62ad73251b577dc4e0
-
SHA256
11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233
-
SHA512
24aeb92ba0c3c2cea80abb9a521a89d6c029499877927e81c1c8619b6698a602ec1da89bcfacf21d930d84dc728f746e8d8141092ea78ac70b4aa51b37a0297d
-
SSDEEP
24576:UoxZaQ2/pC+MoEbA6lm4rQl/ipzrrxoceVwaOW0rs0Lqs96e+ZHOt:UrNhC+MFrm9l/UXFle5ODrskoe+0t
Static task
static1
Behavioral task
behavioral1
Sample
11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233.exe
Resource
win7-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
ubahaman1@mail.ru - Password:
limited1
Targets
-
-
Target
11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233
-
Size
1.4MB
-
MD5
eefdc3d8d051270b7b1ff4d98ce61422
-
SHA1
20bdb8aa5899a34e6430ef62ad73251b577dc4e0
-
SHA256
11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233
-
SHA512
24aeb92ba0c3c2cea80abb9a521a89d6c029499877927e81c1c8619b6698a602ec1da89bcfacf21d930d84dc728f746e8d8141092ea78ac70b4aa51b37a0297d
-
SSDEEP
24576:UoxZaQ2/pC+MoEbA6lm4rQl/ipzrrxoceVwaOW0rs0Lqs96e+ZHOt:UrNhC+MFrm9l/UXFle5ODrskoe+0t
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-