General
-
Target
93bc99905620661f100da9d687f3595976bab1fe19525c02ec25fc2599a0d418_JC.exe
-
Size
663KB
-
Sample
231010-wljhzshc45
-
MD5
6936e6c770ba9348a73df1515fde7f99
-
SHA1
7b42bc73b248c4f33a4bbe889577d28ac7e2b6f4
-
SHA256
93bc99905620661f100da9d687f3595976bab1fe19525c02ec25fc2599a0d418
-
SHA512
768ab6d17726741efc466d9b6c926fd3cc17aee8bab4df2b86358abeaea4565ebf7b6abf28ba02f362ff2eb2377fd78c5ab3d13fe373beb3b095b4bd393b37df
-
SSDEEP
12288:9R0mAxik5FyfxBeuXDDx+Y1Vd9ZBtYdyqJNMZu7s9TO:9amAEfxBeYDN+YfZBRqzP7s9TO
Static task
static1
Behavioral task
behavioral1
Sample
93bc99905620661f100da9d687f3595976bab1fe19525c02ec25fc2599a0d418_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.nutrigefar.com - Port:
587 - Username:
[email protected] - Password:
UZXq+(D!ZA)M
Targets
-
-
Target
93bc99905620661f100da9d687f3595976bab1fe19525c02ec25fc2599a0d418_JC.exe
-
Size
663KB
-
MD5
6936e6c770ba9348a73df1515fde7f99
-
SHA1
7b42bc73b248c4f33a4bbe889577d28ac7e2b6f4
-
SHA256
93bc99905620661f100da9d687f3595976bab1fe19525c02ec25fc2599a0d418
-
SHA512
768ab6d17726741efc466d9b6c926fd3cc17aee8bab4df2b86358abeaea4565ebf7b6abf28ba02f362ff2eb2377fd78c5ab3d13fe373beb3b095b4bd393b37df
-
SSDEEP
12288:9R0mAxik5FyfxBeuXDDx+Y1Vd9ZBtYdyqJNMZu7s9TO:9amAEfxBeYDN+YfZBRqzP7s9TO
-
Suspicious use of SetThreadContext
-