General
-
Target
000299288171.exe
-
Size
1.0MB
-
Sample
231011-xrhz3shc44
-
MD5
5b7bc70c7f80f99d18b088e63e695d1f
-
SHA1
0d2ba9af627b20c8691e815253cff174cc8f6c66
-
SHA256
d14fd7f28b6b02224fed34d96a94c11952a18f8cbcbd2ae7f4df483dee2cb3de
-
SHA512
f3eb32fa253d0ec14113d21a27e1886e28499751cc283c62258762c8a4ed7868ca001c6e5d652e41ce2e37d120075c9d55823fbf083824bf7e1ead889fae2643
-
SSDEEP
24576:rSB7yFISxUyL61sOPijEuplGRQjrlPB7Lw9IOiMpEOtoYIHXZVbFmuseSN:ezMLwsbjfGRerlm9IOiWEOGnrRtNw
Static task
static1
Behavioral task
behavioral1
Sample
000299288171.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
000299288171.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.etasimali.com - Port:
587 - Username:
[email protected] - Password:
RECRUTEMENT@2023
Targets
-
-
Target
000299288171.exe
-
Size
1.0MB
-
MD5
5b7bc70c7f80f99d18b088e63e695d1f
-
SHA1
0d2ba9af627b20c8691e815253cff174cc8f6c66
-
SHA256
d14fd7f28b6b02224fed34d96a94c11952a18f8cbcbd2ae7f4df483dee2cb3de
-
SHA512
f3eb32fa253d0ec14113d21a27e1886e28499751cc283c62258762c8a4ed7868ca001c6e5d652e41ce2e37d120075c9d55823fbf083824bf7e1ead889fae2643
-
SSDEEP
24576:rSB7yFISxUyL61sOPijEuplGRQjrlPB7Lw9IOiMpEOtoYIHXZVbFmuseSN:ezMLwsbjfGRerlm9IOiWEOGnrRtNw
Score10/10-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-