General
-
Target
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2
-
Size
1.6MB
-
Sample
221128-sk614scf22
-
MD5
ce886e11470f2c412bec92068e218dcc
-
SHA1
7eee13f6ffd8c090ebf5b473157471bbd4777285
-
SHA256
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2
-
SHA512
9110fc420aad3e3cef60f26c5a27595c4b2b8cf8014796d290353230919095d8758426357af2632117b4fd64ec47ea9e684218cc005cfb4a73a4096385e5ea65
-
SSDEEP
24576:Vs8heLI/N3XYyFa2SUq7XxmhrWBOmdjuhfU8H9/ZGim0dQDNYVnQQDOTgWy+y1:osx7aprxAWsmVC8Q9/4im0af4Og6
Static task
static1
Behavioral task
behavioral1
Sample
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.messagingengine.com - Port:
587 - Username:
azarbaijJ@fastmail.com - Password:
qedrks8q9hlo8up1ao7hrljvc7
Targets
-
-
Target
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2
-
Size
1.6MB
-
MD5
ce886e11470f2c412bec92068e218dcc
-
SHA1
7eee13f6ffd8c090ebf5b473157471bbd4777285
-
SHA256
c1871e387ef16df81eb3d2f075434d631388d0182e345392b5d541690622ead2
-
SHA512
9110fc420aad3e3cef60f26c5a27595c4b2b8cf8014796d290353230919095d8758426357af2632117b4fd64ec47ea9e684218cc005cfb4a73a4096385e5ea65
-
SSDEEP
24576:Vs8heLI/N3XYyFa2SUq7XxmhrWBOmdjuhfU8H9/ZGim0dQDNYVnQQDOTgWy+y1:osx7aprxAWsmVC8Q9/4im0af4Og6
-
Modifies WinLogon for persistence
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-