General
-
Target
t40bd50ace847a114b83265af91b7.exe
-
Size
315KB
-
Sample
231014-bnd13ahd7v
-
MD5
302fb687c1912342845fe7aa4517754c
-
SHA1
4b38aa9b8cc0e9696c3d79ad057d9f1caad86c55
-
SHA256
7b2dea7a8eff410159459e3f89c5e4fa81f8b9d2f6ce02cfaf8e307f3adf9f85
-
SHA512
7f84eb441ed7b4e0296f37cc16015d96b9cf829648e46058248d3e7b731a443e2c549f07ba7632f49f12e44d6759efdc7ccadd184a87ac2aa19597d1263931da
-
SSDEEP
6144:8T9+O50zYvPAtwVj6XbeBuQdwLaA19bUUyFLa:84H8XQ3QdwLaZUWL
Behavioral task
behavioral1
Sample
t40bd50ace847a114b83265af91b7.exe
Resource
win7-20230831-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160
Targets
-
-
Target
t40bd50ace847a114b83265af91b7.exe
-
Size
315KB
-
MD5
302fb687c1912342845fe7aa4517754c
-
SHA1
4b38aa9b8cc0e9696c3d79ad057d9f1caad86c55
-
SHA256
7b2dea7a8eff410159459e3f89c5e4fa81f8b9d2f6ce02cfaf8e307f3adf9f85
-
SHA512
7f84eb441ed7b4e0296f37cc16015d96b9cf829648e46058248d3e7b731a443e2c549f07ba7632f49f12e44d6759efdc7ccadd184a87ac2aa19597d1263931da
-
SSDEEP
6144:8T9+O50zYvPAtwVj6XbeBuQdwLaA19bUUyFLa:84H8XQ3QdwLaZUWL
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-