General
-
Target
adada.PNG
-
Size
76KB
-
Sample
230407-n3bwgaah3t
-
MD5
7f27ce967f0c166b8b16ba9760f99acf
-
SHA1
1d558925b3a10f88f046d553f123102992bdcd43
-
SHA256
58087009edda7a991e05a6cd97eb1a886cabaecc747a23b184711edcface9011
-
SHA512
57673dded5e4d203d459348d6211296f0f50d71ed0cf13bd69d214bb03d28adc44ecba8fa7256482832f50497bf761dc360e7f5b309797e506117c1733a3cb3c
-
SSDEEP
1536:404kejL2F1oapwlO69zertfv4pDCFq9nRlG9O886+B23CgS+KhNT:40Pc6pwl59zertnE5dRlG986+BSC9vhV
Static task
static1
Behavioral task
behavioral1
Sample
adada.png
Resource
win10v2004-20230220-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
122112qweewq
Extracted
raccoon
13718a923845c0cdab8ce45c585b8d63
http://45.15.156.143/
Extracted
44caliber
https://discordapp.com/api/webhooks/856268306523619338/XvZ9UZ7iH16syfNxW6g_pKMGVgE3CO0QMpSicS1IpfMCJpo17vFJMlhLObAOQRJWSrw9
Targets
-
-
Target
adada.PNG
-
Size
76KB
-
MD5
7f27ce967f0c166b8b16ba9760f99acf
-
SHA1
1d558925b3a10f88f046d553f123102992bdcd43
-
SHA256
58087009edda7a991e05a6cd97eb1a886cabaecc747a23b184711edcface9011
-
SHA512
57673dded5e4d203d459348d6211296f0f50d71ed0cf13bd69d214bb03d28adc44ecba8fa7256482832f50497bf761dc360e7f5b309797e506117c1733a3cb3c
-
SSDEEP
1536:404kejL2F1oapwlO69zertfv4pDCFq9nRlG9O886+B23CgS+KhNT:40Pc6pwl59zertnE5dRlG986+BSC9vhV
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-