General
-
Target
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59
-
Size
796KB
-
Sample
230129-wsf2fahh7s
-
MD5
ed324586abab9577b78a416e73829960
-
SHA1
39d94b92e3ab81071f1e327a6738d7d4b26b15a4
-
SHA256
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59
-
SHA512
d057e4633d126eee7abca2f72aa30114ccd46021666ce141996ec29cc26a861a2d399010fc95298d9fad221de959316205b9e656840ee7c4f5999a5caf2f5730
-
SSDEEP
12288:cgfbgfUeDfgCnabfwZ87edfzYTPeHdZuh4A0o9saD9YeQdF67JbOj6KgfF:ugWabfwOS0iZONyS1QdFix/1
Static task
static1
Behavioral task
behavioral1
Sample
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59
-
Size
796KB
-
MD5
ed324586abab9577b78a416e73829960
-
SHA1
39d94b92e3ab81071f1e327a6738d7d4b26b15a4
-
SHA256
c3bc5692020a780e234f08b88b9ce7fb303a9f22d25cfe49d20136f706c22a59
-
SHA512
d057e4633d126eee7abca2f72aa30114ccd46021666ce141996ec29cc26a861a2d399010fc95298d9fad221de959316205b9e656840ee7c4f5999a5caf2f5730
-
SSDEEP
12288:cgfbgfUeDfgCnabfwZ87edfzYTPeHdZuh4A0o9saD9YeQdF67JbOj6KgfF:ugWabfwOS0iZONyS1QdFix/1
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-