General
-
Target
cc69c7d6e3e3c93b31ef9c7937a3fb52.exe
-
Size
1.5MB
-
Sample
230106-s38bwsha85
-
MD5
cc69c7d6e3e3c93b31ef9c7937a3fb52
-
SHA1
f0e9419c99fe3432662a311975fdd57da54baf4f
-
SHA256
9360554f2e28415c1060e32aed40757998e0b16db0905f4ae5e1d21676b00ec5
-
SHA512
3ddb066195d05138d82ce33fdc273cd5fe6e411b2d8e18bc3a0e07f2076af4f9b33848bec63915dfa56aa58fe659609e623820e1463a3b450c065a9f20dc5a20
-
SSDEEP
24576:HnsJ39LyjbJkQFMhmC+6GD9zq1I+Rz6OuN6nLSgg/p97/2sX8Ec5l:HnsHyjtk2MYC5GDNq1IsuN8fKpJsr
Static task
static1
Behavioral task
behavioral1
Sample
cc69c7d6e3e3c93b31ef9c7937a3fb52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc69c7d6e3e3c93b31ef9c7937a3fb52.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.ioit.ac.vn - Port:
587 - Username:
[email protected] - Password:
Newton@23
Targets
-
-
Target
cc69c7d6e3e3c93b31ef9c7937a3fb52.exe
-
Size
1.5MB
-
MD5
cc69c7d6e3e3c93b31ef9c7937a3fb52
-
SHA1
f0e9419c99fe3432662a311975fdd57da54baf4f
-
SHA256
9360554f2e28415c1060e32aed40757998e0b16db0905f4ae5e1d21676b00ec5
-
SHA512
3ddb066195d05138d82ce33fdc273cd5fe6e411b2d8e18bc3a0e07f2076af4f9b33848bec63915dfa56aa58fe659609e623820e1463a3b450c065a9f20dc5a20
-
SSDEEP
24576:HnsJ39LyjbJkQFMhmC+6GD9zq1I+Rz6OuN6nLSgg/p97/2sX8Ec5l:HnsHyjtk2MYC5GDNq1IsuN8fKpJsr
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-