General
-
Target
26902439b97a49f43343f56542ccd022.bin
-
Size
697KB
-
Sample
230722-bgwyashc83
-
MD5
23cfbe50ea0246e637f62a84d4933269
-
SHA1
2cb0b44fc38ba4549798e1a025f7df6c3c1217a7
-
SHA256
22dcfff3b9bee6f90db191f9b936ee81bdd1b69e6da87bd13c7de3769754df42
-
SHA512
eadfcb1e809048b11514169e40df988f59cc0f6a37cf3c497767c59c709c1487e467a74a3c6fd5d6589f7a705f13a6406ddfd1adf47c37c9c7cdca6fe61a28f8
-
SSDEEP
12288:u2jiqbc8Otx537W4KS99HYSqJg0hShzvZaH22yaCdraeJ5Jrar9vdBoynbFml24f:Niqbcdta4nHYzwhzMHr1ChGhdZm0O
Static task
static1
Behavioral task
behavioral1
Sample
7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.lafer.mx - Port:
587 - Username:
[email protected] - Password:
ok)Q!)N7
Targets
-
-
Target
7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869.exe
-
Size
779KB
-
MD5
26902439b97a49f43343f56542ccd022
-
SHA1
62c8627231ee0197fa6c1340480ff9ce86433dec
-
SHA256
7a9219fbe2409d6080f9853798e178538b6f58669d94fa4346efae44e7478869
-
SHA512
8695ae0fdd4fee035c5d6b5339d7ea0be201d9f3119922fabfb66f226f844773ab464834791baf27c97ef10ec734458c77fa6a7d56126e77516b2c4b431ff951
-
SSDEEP
24576:+2ATdCjEQPPymw6h4coQW0z+DVPqGZXU:+b5CAQPR49QW0+Ds
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1