General
-
Target
nppshell.exe
-
Size
2.1MB
-
Sample
221221-clfybaee9z
-
MD5
14babf2e06fda6c120cbe98c0746a984
-
SHA1
57ccbb753fa2a6ea8e6f45c1ced3326404969b04
-
SHA256
202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab
-
SHA512
20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57
-
SSDEEP
49152:0Dv5ESHLhxCaOAJpMG5uozbf1T8zhNjox1l5fr3Wyx2:++CL7TOAJ2G5uoNT5x1bfr3nQ
Static task
static1
Behavioral task
behavioral1
Sample
nppshell.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
nppshell.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.60
85.209.135.11/gjend7w/index.php
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Targets
-
-
Target
nppshell.exe
-
Size
2.1MB
-
MD5
14babf2e06fda6c120cbe98c0746a984
-
SHA1
57ccbb753fa2a6ea8e6f45c1ced3326404969b04
-
SHA256
202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab
-
SHA512
20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57
-
SSDEEP
49152:0Dv5ESHLhxCaOAJpMG5uozbf1T8zhNjox1l5fr3Wyx2:++CL7TOAJ2G5uoNT5x1bfr3nQ
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-