General
-
Target
PO2023.exe
-
Size
588KB
-
Sample
231005-klen9ahg2t
-
MD5
a98108f853d463f53cbf9d387939a355
-
SHA1
3a247e03235c86730326f68319248d38b1a83531
-
SHA256
15721ae2d04e5e9d1b9d49821e87cf5007bee2ba0b4306f5e6d0d190f2591759
-
SHA512
2cc43621d9eb78e3b01fe06b11031853c3472a9d3b7c9fe00813952f364a03d21778d0e56dc16c045770ea07abc9065b80669a3444643f19b5fd94bed0eba3b0
-
SSDEEP
12288:tawpe2SdqfYdxy1KhF5wZKvg7qNZfK3Gwwfe/7rM4VWjbH:tawpe2Sdqgm1AmFMZksf03kjbH
Static task
static1
Behavioral task
behavioral1
Sample
PO2023.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PO2023.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.selmopackaging.com - Port:
587 - Username:
[email protected] - Password:
}CK2:}[&<my&%xjZ
Targets
-
-
Target
PO2023.exe
-
Size
588KB
-
MD5
a98108f853d463f53cbf9d387939a355
-
SHA1
3a247e03235c86730326f68319248d38b1a83531
-
SHA256
15721ae2d04e5e9d1b9d49821e87cf5007bee2ba0b4306f5e6d0d190f2591759
-
SHA512
2cc43621d9eb78e3b01fe06b11031853c3472a9d3b7c9fe00813952f364a03d21778d0e56dc16c045770ea07abc9065b80669a3444643f19b5fd94bed0eba3b0
-
SSDEEP
12288:tawpe2SdqfYdxy1KhF5wZKvg7qNZfK3Gwwfe/7rM4VWjbH:tawpe2Sdqgm1AmFMZksf03kjbH
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-