General
-
Target
3d2b5b2bb9898c528c6800018b6225965bec251fc3f49ccf1d2cc42dde7c2018
-
Size
447KB
-
Sample
231002-x3zf7sfg63
-
MD5
bd8e0300c2ca066e68b93e523ad01f28
-
SHA1
4a394a8618e9bc7876fc6de227d744886fe8f51d
-
SHA256
3d2b5b2bb9898c528c6800018b6225965bec251fc3f49ccf1d2cc42dde7c2018
-
SHA512
28a2b2e10e61dd1df03c0637c9a0781877eb06c72999faaa57b6b7150ca8cb26cb2b9ab5c340e94b5a7ffe35742c8106dae1b01ea962f491ed89970049ff95e2
-
SSDEEP
12288:CvCwf6Hw6DYkXrrjn9wDioy+z+DBCwFr0XH3tPgpkHQej7x+N:GfZk7M5rzwBjr059QO7xY
Static task
static1
Behavioral task
behavioral1
Sample
PO698535787884.exe
Resource
win7-20230831-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Chibuonyenze8888
Targets
-
-
Target
PO698535787884.bat
-
Size
618KB
-
MD5
9041039000fabe2ec5a095d7466c2a63
-
SHA1
0b5ac9c7ce086fc844dd9c8dadfa72f9c7cbd210
-
SHA256
fdd1809f12f7c3da60911712659cb458ea68a10f2db7a08dd0b4a4d49c0ac7c0
-
SHA512
0ab192616ade6c4349ec259b8155e90d0317e3590f8f9ec077f30f506fc30bef9f38e8cc76504f94ab16a02839140194c762ce5d212c28245e1ea113751062ed
-
SSDEEP
12288:fM0yMLFPlP5ZkXrrTJ9i5ioy+zgDdCwTPIXH3tPO3QtQB8K:f7LFtnk7E5rzSdRPI5zQB
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-