General
-
Target
677809.exe
-
Size
541KB
-
Sample
230111-pwrh1sca76
-
MD5
7416af0e6dbe13b36bdfe2e609b00666
-
SHA1
5958c7eb0d93510ff00241c7257d7026c207c7e8
-
SHA256
25483a164b2ab3cb283f494f2022793b99595bbf3af41b0620dcd3b0d3d612be
-
SHA512
e29221074b0c84d093a6b0e70d9912a5300a7fc2f9c096ecaff07d282dfe85f656c6fb6f1b02e5873be42e23aac6abb7032b159add757bd188c6abd3547ecda1
-
SSDEEP
12288:oY+ojsYcfslV1Px6E4ZNmnh6rzYk9Lbfd5vS9/TRTA:oY9sYcfslV1slZqhRkBbV5voVk
Static task
static1
Behavioral task
behavioral1
Sample
677809.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
677809.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
677809.exe
-
Size
541KB
-
MD5
7416af0e6dbe13b36bdfe2e609b00666
-
SHA1
5958c7eb0d93510ff00241c7257d7026c207c7e8
-
SHA256
25483a164b2ab3cb283f494f2022793b99595bbf3af41b0620dcd3b0d3d612be
-
SHA512
e29221074b0c84d093a6b0e70d9912a5300a7fc2f9c096ecaff07d282dfe85f656c6fb6f1b02e5873be42e23aac6abb7032b159add757bd188c6abd3547ecda1
-
SSDEEP
12288:oY+ojsYcfslV1Px6E4ZNmnh6rzYk9Lbfd5vS9/TRTA:oY9sYcfslV1slZqhRkBbV5voVk
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-