General
-
Target
4DA4E24086338BD0451BEC5230D9CA86.zip
-
Size
852KB
-
Sample
230212-k67krsbd6v
-
MD5
ee94331d487123d6e43418f30e0bca05
-
SHA1
a8b3a424eb0d67913c03c56763d00e5c9038dd8a
-
SHA256
e1cc0584feb40a622ad84dd0e82e01f49e2f1013114996e9b24560e6f050b9d3
-
SHA512
4fe2700e1ca48604d0a17b70003207e5a62a29ee6a23d89ba3f4a68efc1b3c56e6a5d545b4ac2956a0ba12ae8d26ddac27911a656f7eb8357bd92297cb9b912c
-
SSDEEP
24576:OrjYyY6cGIPtfElp/W+FCwkCUSBuaAwP8RW:O/rvIP6lp/WuPXUCAICW
Static task
static1
Behavioral task
behavioral1
Sample
4DA4E24086338BD0451BEC5230D9CA86.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4DA4E24086338BD0451BEC5230D9CA86.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
mrssussydominic@gmail.com - Password:
nnaemeka12
Targets
-
-
Target
4DA4E24086338BD0451BEC5230D9CA86.exe
-
Size
1.0MB
-
MD5
4da4e24086338bd0451bec5230d9ca86
-
SHA1
7fc81b5f70e3d7af4a9d55cdc38afb0cfdec8158
-
SHA256
c76f6e44390f63e0a43bddef270f959c31899c65b93f139a0efbd2f2e625b1a8
-
SHA512
628077dd26bd8a6bfdb1333095063796079a85aff8c90caac70be770f662fa7fa436bbae19610b8f25caaddc34024eb98f051e269bfbc5d85e8bf840a5790e79
-
SSDEEP
24576:gRZVFDDpos7pkagvZTuGY8IyS0CaLF7Od+PGstTIVtfO:KZVJ6s9kagz9IySH+e2TIVtfO
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-