General
-
Target
PO#894.rar
-
Size
926KB
-
Sample
230707-v7prfsad52
-
MD5
65bdc1b30598344a06753bdcdb92e920
-
SHA1
9467fa3dd1e714d125a0d4f142c41cdb211c05e3
-
SHA256
bec10e0f1fa3d6a1485f8590c5d11f082a2c3a57eac821332eca390b18d4c036
-
SHA512
22f975eb92fa2f407201569a3a2eeb61971bec79d975f289aea5c6e9c14cd3a00366c9e59344024fdcbc4e580b67a248eb532921a727a9e68b6086dd1ed3e230
-
SSDEEP
24576:TipUFxaV743rP+zcHDC4kGudwnCLw0dHq:TipaaV7SPjC4WdgVF
Static task
static1
Behavioral task
behavioral1
Sample
PO#894.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PO#894.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.lucd.ru - Port:
21 - Username:
[email protected] - Password:
doll@@2020
Targets
-
-
Target
PO#894.exe
-
Size
1.5MB
-
MD5
9ae482062c306491334cb178fe919a3e
-
SHA1
c2f76bc7512dfc45621fc7f23f8b2deb6c45f5f0
-
SHA256
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac
-
SHA512
8dcd3ad324ada81ac3c40618b3754aa850f9fbdd4ee26105a28bdd39b62ae0625688827eae5499de6358779f150c7c2f790a136d010b7d55169203253a81bddb
-
SSDEEP
24576:PXXQKVZnyHJ/mUgHrxpyUdjYxZi/nLzy+yNzbMCms016w33yd2OluON4fA9uCG:PHQ4nypujrxp5YxZ8LzlyZAd/L3yd2O8
-
Looks for VirtualBox Guest Additions in registry
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-