General
-
Target
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5
-
Size
692KB
-
Sample
221128-k67krsgb7x
-
MD5
f5a4cfa487cf9b551c5e5227c1703dff
-
SHA1
eadfe6328dc2e183fcc85cc228d58de5e8876e37
-
SHA256
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5
-
SHA512
149af066b63c062daffadb6f7df2cf1b4c038a342699ba46bcf1e10bf4375ae88cbcd2625647afa88931027637a4c6a28a1058e3a1e439b5616717d35b75e41d
-
SSDEEP
12288:4QtqB5urTIoYWBQk1E+VF9mOx91wXRbsTy:4QtqBorTlYWBhE+V3mOSbsT
Static task
static1
Behavioral task
behavioral1
Sample
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
preston99
Targets
-
-
Target
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5
-
Size
692KB
-
MD5
f5a4cfa487cf9b551c5e5227c1703dff
-
SHA1
eadfe6328dc2e183fcc85cc228d58de5e8876e37
-
SHA256
1dd3dd08dc740fc8a12a19446f140e8b43adce8d3e16b4116e9cb8bb36bae2b5
-
SHA512
149af066b63c062daffadb6f7df2cf1b4c038a342699ba46bcf1e10bf4375ae88cbcd2625647afa88931027637a4c6a28a1058e3a1e439b5616717d35b75e41d
-
SSDEEP
12288:4QtqB5urTIoYWBQk1E+VF9mOx91wXRbsTy:4QtqBorTlYWBhE+V3mOSbsT
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-