General
-
Target
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0
-
Size
629KB
-
Sample
221128-ltke5shh7s
-
MD5
06b8e4552f1c5eac7f3ae1f35bf377ee
-
SHA1
bc7030e72d99d90ca1192660f1fd8ef5f50d1df4
-
SHA256
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0
-
SHA512
c23e3cf3b8cbac83af5a17e89b1588f99c3c45566b5eb6daecd2f9134bb705307e79941bf1bf88005e179950a57cf652f71d315760a92358d21e586a6f40c162
-
SSDEEP
12288:JYg5RCjsR9/MvE6CKUXjCJWx3G8F9CM2mLOlLoHKdYH1CeZbi6ezAot3EF8x20CF:J35AjsXwTUXWMQ8F9CMtOlLoHKdYH1C6
Behavioral task
behavioral1
Sample
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0
-
Size
629KB
-
MD5
06b8e4552f1c5eac7f3ae1f35bf377ee
-
SHA1
bc7030e72d99d90ca1192660f1fd8ef5f50d1df4
-
SHA256
6ca4db78b727b7a674a144d879a5f4c4f18df5b672057f5c03b0326d2a3189d0
-
SHA512
c23e3cf3b8cbac83af5a17e89b1588f99c3c45566b5eb6daecd2f9134bb705307e79941bf1bf88005e179950a57cf652f71d315760a92358d21e586a6f40c162
-
SSDEEP
12288:JYg5RCjsR9/MvE6CKUXjCJWx3G8F9CM2mLOlLoHKdYH1CeZbi6ezAot3EF8x20CF:J35AjsXwTUXWMQ8F9CMtOlLoHKdYH1C6
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-