General
-
Target
9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7
-
Size
156KB
-
Sample
221202-wafmyshg88
-
MD5
467b4da232c32399ac7dd1c878e8d513
-
SHA1
c481093e391ba3603f29927e589ed946da5a83f4
-
SHA256
9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7
-
SHA512
c868447bdbe9bd9247ebc814f479fb8db6fb776a488cd1df45072672f705935003e95ea3754ead991d49a4ed107bc8bb1eae034fd60471203ee05a04db1058ce
-
SSDEEP
3072:AHi5F65ueJ5Xaa0pxPznruTmAMJBhC3A3Bg:AVfXafznrYMJk0B
Static task
static1
Behavioral task
behavioral1
Sample
9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7.exe
Resource
win7-20220812-en
Malware Config
Extracted
Protocol: smtp- Host:
Smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
kolokol000
Targets
-
-
Target
9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7
-
Size
156KB
-
MD5
467b4da232c32399ac7dd1c878e8d513
-
SHA1
c481093e391ba3603f29927e589ed946da5a83f4
-
SHA256
9db14699ff0f8d42d946bbd633f2bfb7adde78fe3efb5585046f4e967a7dbbb7
-
SHA512
c868447bdbe9bd9247ebc814f479fb8db6fb776a488cd1df45072672f705935003e95ea3754ead991d49a4ed107bc8bb1eae034fd60471203ee05a04db1058ce
-
SSDEEP
3072:AHi5F65ueJ5Xaa0pxPznruTmAMJBhC3A3Bg:AVfXafznrYMJk0B
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-